CVE-2024-6915

9.3 CRITICAL

📋 TL;DR

JFrog Artifactory versions below specified security releases are vulnerable to cache poisoning due to improper input validation. This vulnerability allows attackers to manipulate cached content, potentially serving malicious artifacts to users. Organizations using affected JFrog Artifactory versions for artifact management are at risk.

💻 Affected Systems

Products:
  • JFrog Artifactory
Versions: Versions below 7.90.6, 7.84.20, 7.77.14, 7.71.23, 7.68.22, 7.63.22, 7.59.23, 7.55.18
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could poison the artifact cache to distribute malicious software packages to downstream systems, leading to supply chain compromise and potential remote code execution across the organization.

🟠

Likely Case

Cache manipulation leading to distribution of tampered artifacts, potentially causing application failures, security breaches, or data corruption in dependent systems.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated environments, though cache integrity remains compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of Artifactory cache mechanisms and ability to submit crafted requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.90.6, 7.84.20, 7.77.14, 7.71.23, 7.68.22, 7.63.22, 7.59.23, or 7.55.18 depending on your current version track

Vendor Advisory: https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories

Restart Required: Yes

Instructions:

1. Identify your current Artifactory version. 2. Download the appropriate patched version from JFrog's official distribution. 3. Follow JFrog's upgrade documentation for your deployment type. 4. Restart Artifactory services after upgrade.

🔧 Temporary Workarounds

Restrict Artifactory Access

all

Limit network access to Artifactory instances to trusted sources only

Implement WAF Rules

all

Deploy web application firewall rules to detect and block suspicious cache-related requests

🧯 If You Can't Patch

  • Isolate Artifactory instances behind strict network segmentation
  • Implement enhanced monitoring for cache manipulation attempts

🔍 How to Verify

Check if Vulnerable:

Check Artifactory version via web interface or system configuration files

Check Version:

Check Artifactory web interface or examine $ARTIFACTORY_HOME/etc/artifactory.system.properties

Verify Fix Applied:

Confirm version number matches or exceeds patched versions listed in advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual cache modification patterns
  • Requests with malformed cache-related parameters
  • Unexpected artifact serving events

Network Indicators:

  • Suspicious HTTP requests to cache endpoints
  • Unusual traffic patterns to Artifactory cache directories

SIEM Query:

source="artifactory" AND (event_type="cache_modification" OR http_uri CONTAINS "/api/cache/") AND status="200"

🔗 References

📤 Share & Export