CVE-2024-7330

6.3 MEDIUM

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in YouDianCMS 7 that allows attackers to manipulate the curl_exec function to make unauthorized requests from the vulnerable server. Attackers can exploit this remotely to potentially access internal systems or services. All users running YouDianCMS 7 are affected by this critical vulnerability.

💻 Affected Systems

Products:
  • YouDianCMS
Versions: Version 7
Operating Systems: All operating systems running YouDianCMS
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the ydLib.php file's curl_exec function when processing URL parameters. All installations of YouDianCMS 7 are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could use the vulnerable server as a proxy to access internal network resources, perform port scanning, interact with cloud metadata services, or chain with other vulnerabilities to achieve remote code execution.

🟠

Likely Case

Attackers will exploit this to make unauthorized requests to internal services, potentially accessing sensitive data or performing reconnaissance on internal networks.

🟢

If Mitigated

With proper network segmentation and egress filtering, the impact is limited to the server making unauthorized external requests, though internal network access may still be possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit has been publicly disclosed and requires minimal technical skill to execute. Attackers can trigger the vulnerability by manipulating URL parameters sent to the vulnerable function.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch is available as the vendor did not respond to disclosure. Consider upgrading to a different CMS or implementing workarounds.

🔧 Temporary Workarounds

Input Validation and URL Whitelisting

all

Implement strict input validation for URL parameters and restrict curl_exec to only allow requests to trusted domains.

Modify /App/Core/Extend/Function/ydLib.php to validate URL parameters before curl_exec

Disable Vulnerable Function

all

Temporarily disable or restrict access to the vulnerable function until a proper fix is available.

Comment out or modify the curl_exec call in ydLib.php to return an error for unauthorized requests

🧯 If You Can't Patch

  • Implement network-level restrictions to limit outbound connections from the server to only necessary services
  • Deploy a Web Application Firewall (WAF) with SSRF protection rules to block malicious requests

🔍 How to Verify

Check if Vulnerable:

Check if YouDianCMS version 7 is installed and review the /App/Core/Extend/Function/ydLib.php file for the curl_exec function with URL parameter handling.

Check Version:

Check YouDianCMS configuration files or admin panel for version information

Verify Fix Applied:

Test that URL parameter manipulation no longer allows unauthorized requests through the curl_exec function.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from the server, especially to internal IP addresses or cloud metadata endpoints
  • Multiple failed or unusual curl requests in application logs

Network Indicators:

  • Unexpected outbound HTTP traffic from the server to unusual destinations
  • Requests to internal network addresses from the web server

SIEM Query:

source="web_server_logs" AND (url_contains="curl_exec" OR url_contains="ydLib.php") AND (dest_ip=private_ip_range OR dest_ip=169.254.169.254)

🔗 References

📤 Share & Export