CVE-2024-55082

7.5 HIGH

📋 TL;DR

This SSRF vulnerability in Stirling-PDF allows attackers to make the server send requests to internal systems by manipulating the /url-to-pdf endpoint. Attackers can potentially access sensitive internal services, metadata, or files. Anyone running Stirling-PDF 0.35.1 with the vulnerable endpoint exposed is affected.

💻 Affected Systems

Products:
  • Stirling-PDF
Versions: 0.35.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with the /url-to-pdf endpoint enabled and accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers access cloud metadata services (AWS/Azure/GCP), internal databases, or sensitive files, leading to full internal network compromise.

🟠

Likely Case

Attackers access internal HTTP services, retrieve sensitive information from internal APIs, or perform port scanning of internal infrastructure.

🟢

If Mitigated

Limited to accessing only allowed external resources with minimal internal exposure.

🌐 Internet-Facing: HIGH - Directly exposed endpoint allows unauthenticated attackers to probe internal networks.
🏢 Internal Only: MEDIUM - Internal attackers could still abuse this to pivot within the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request manipulation required. Public PoC available in GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Upgrade to a version beyond 0.35.1 if available, or implement workarounds.

🔧 Temporary Workarounds

Disable vulnerable endpoint

all

Remove or disable the /url-to-pdf endpoint in Stirling-PDF configuration

Edit Stirling-PDF configuration to disable url-to-pdf functionality

Network segmentation

linux

Restrict Stirling-PDF server's outbound network access

iptables -A OUTPUT -p tcp --dport 80 -j DROP
iptables -A OUTPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Implement strict input validation on the /url-to-pdf endpoint to only allow specific, trusted URLs
  • Deploy a WAF with SSRF protection rules to filter malicious requests

🔍 How to Verify

Check if Vulnerable:

Send a request to http://{server}/url-to-pdf with url parameter pointing to internal service (like http://169.254.169.254/latest/meta-data/)

Check Version:

Check Stirling-PDF version in web interface or configuration files

Verify Fix Applied:

Test if the endpoint still accepts arbitrary URLs after implementing controls

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to /url-to-pdf with internal IPs or metadata service URLs
  • Multiple failed conversion attempts

Network Indicators:

  • Stirling-PDF server making unexpected outbound connections to internal services

SIEM Query:

source="stirling-pdf" AND uri="/url-to-pdf" AND (url="*169.254*" OR url="*metadata*" OR url="*internal*" OR url="*localhost*")

🔗 References

📤 Share & Export