CVE-2024-55089

4.1 MEDIUM

📋 TL;DR

Rhymix CMS version 2.1.19 contains a Server-Side Request Forgery (SSRF) vulnerability in its background import data function. This allows authenticated attackers to make the server send arbitrary HTTP requests to internal or external systems, potentially accessing sensitive internal services. Only Rhymix installations with the vulnerable version and authenticated user access are affected.

💻 Affected Systems

Products:
  • Rhymix CMS
Versions: 2.1.19
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the background import data function. Earlier versions may also be affected but not confirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could pivot to internal networks, access cloud metadata services, perform port scanning of internal systems, or interact with internal APIs to steal sensitive data or execute further attacks.

🟠

Likely Case

Attackers with authenticated access could exfiltrate data from internal services, scan internal networks, or abuse the server as a proxy for malicious activities.

🟢

If Mitigated

With proper network segmentation and egress filtering, impact is limited to what the server can reach, potentially still allowing some internal service interaction.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access. The vulnerability is in a specific function, making targeted exploitation straightforward for authenticated users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.20 or later

Vendor Advisory: https://github.com/rhymix/rhymix/releases

Restart Required: No

Instructions:

1. Backup your Rhymix installation and database. 2. Download Rhymix 2.1.20 or later from the official repository. 3. Replace the existing files with the updated version. 4. Clear any caches if applicable.

🔧 Temporary Workarounds

Disable Import Function

all

Temporarily disable the background import data function to prevent exploitation.

# Modify Rhymix configuration or disable the module in admin panel

Restrict Network Egress

linux

Configure firewall rules to restrict outbound HTTP/HTTPS traffic from the Rhymix server to only necessary destinations.

# Example iptables rule: iptables -A OUTPUT -p tcp --dport 80 -j DROP
# Example iptables rule: iptables -A OUTPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Rhymix server from sensitive internal systems.
  • Apply web application firewall (WAF) rules to block SSRF patterns in HTTP requests.

🔍 How to Verify

Check if Vulnerable:

Check the Rhymix version in the admin panel or by examining the files/version.php file. If version is 2.1.19, it is vulnerable.

Check Version:

grep -r "RX_VERSION" /path/to/rhymix/files/version.php

Verify Fix Applied:

After updating, verify the version shows 2.1.20 or later in the admin panel or version.php file.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from the Rhymix server to internal IPs or unexpected domains
  • Multiple import function accesses from single user in short time

Network Indicators:

  • HTTP traffic from Rhymix server to internal services not normally accessed
  • Port scanning patterns originating from the Rhymix server

SIEM Query:

source="rhymix_logs" AND (event="import_data" OR url_contains="import") AND dest_ip IN (internal_subnets)

🔗 References

📤 Share & Export