CVE-2024-55399

6.5 MEDIUM

📋 TL;DR

This Server-Side Request Forgery (SSRF) vulnerability in 4C Strategies Exonaut allows attackers to make unauthorized requests from the vulnerable server to internal or external systems. Organizations using Exonaut versions before v21.6.2.1-1 are affected, potentially exposing internal network resources or enabling data exfiltration.

💻 Affected Systems

Products:
  • 4C Strategies Exonaut
Versions: All versions before v21.6.2.1-1
Operating Systems: Any OS running Exonaut
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could pivot to internal systems, access sensitive data, or perform reconnaissance on internal networks by making the vulnerable server proxy requests to restricted resources.

🟠

Likely Case

Information disclosure from internal services, port scanning of internal networks, or limited data exfiltration through the vulnerable server.

🟢

If Mitigated

Limited impact with proper network segmentation and egress filtering, potentially only exposing metadata about internal services.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

SSRF typically requires some level of access to trigger the vulnerable functionality, though authentication requirements are not specified in available references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v21.6.2.1-1 and later

Vendor Advisory: http://exonaut.com

Restart Required: No

Instructions:

1. Download Exonaut v21.6.2.1-1 or later from official vendor sources. 2. Follow vendor upgrade procedures. 3. Verify successful upgrade and functionality.

🔧 Temporary Workarounds

Network Segmentation and Egress Filtering

all

Restrict outbound network traffic from the Exonaut server to only necessary destinations and protocols.

Input Validation Enhancement

all

Implement strict validation of user-supplied URLs or host parameters to prevent SSRF attempts.

🧯 If You Can't Patch

  • Implement strict network egress filtering to limit the Exonaut server's outbound connections
  • Deploy web application firewall (WAF) rules to detect and block SSRF patterns in requests

🔍 How to Verify

Check if Vulnerable:

Check Exonaut version in administration interface or configuration files. If version is below v21.6.2.1-1, the system is vulnerable.

Check Version:

Check Exonaut web interface administration panel or consult application documentation for version information.

Verify Fix Applied:

Confirm version is v21.6.2.1-1 or higher and test SSRF functionality with controlled test cases.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP/HTTPS requests from Exonaut server to internal IP ranges
  • Requests to metadata services (169.254.169.254, etc.)
  • Multiple failed connection attempts to various internal ports

Network Indicators:

  • Exonaut server making unexpected connections to internal services
  • Traffic patterns indicating port scanning from the Exonaut server

SIEM Query:

source_ip="exonaut_server_ip" AND (dest_ip=PRIVATE_IP_RANGE OR dest_ip=169.254.169.254 OR dest_port_SCAN_PATTERN)

🔗 References

📤 Share & Export