CVE-2026-24138

7.5 HIGH

📋 TL;DR

CVE-2026-24138 is an unauthenticated Server-Side Request Forgery (SSRF) vulnerability in FOG Project's getversion.php. Attackers can exploit this by sending specially crafted requests with a user-controlled URL parameter to access internal websites and files on the FOG server. All FOG Project installations running version 1.5.10.1754 or below are affected.

💻 Affected Systems

Products:
  • FOG Project
Versions: 1.5.10.1754 and below
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The vulnerability requires the web interface to be accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the FOG server through internal service enumeration, credential harvesting from metadata services, and potential lateral movement to other internal systems.

🟠

Likely Case

Information disclosure of internal network resources, file system access, and potential credential theft from internal services.

🟢

If Mitigated

Limited to port scanning and basic reconnaissance of internal services if proper network segmentation and access controls are implemented.

🌐 Internet-Facing: HIGH - The vulnerability is unauthenticated and can be exploited remotely if the FOG web interface is exposed to the internet.
🏢 Internal Only: HIGH - Even internally, the vulnerability allows attackers to pivot and access other internal systems from the compromised FOG server.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending HTTP requests with the newService=1 parameter and a malicious URL. The advisory includes technical details that facilitate exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://github.com/FOGProject/fogproject/security/advisories/GHSA-79xw-c2qx-g7xj

Restart Required: No

Instructions:

No official patch is available. Monitor the FOG Project GitHub repository for updates and apply any future patches immediately.

🔧 Temporary Workarounds

Restrict access to getversion.php

linux

Block or restrict access to the vulnerable getversion.php file using web server configuration or firewall rules.

# Apache: Add to .htaccess or virtual host config
<Files "getversion.php">
    Order deny,allow
    Deny from all
</Files>
# Nginx: Add to server block
location ~ /getversion\.php$ {
    deny all;
    return 403;
}

Network segmentation

all

Isolate the FOG server from other internal systems to limit the impact of SSRF exploitation.

🧯 If You Can't Patch

  • Implement strict network access controls to limit the FOG server's outbound connections to only necessary services.
  • Deploy a web application firewall (WAF) with SSRF protection rules to block malicious requests to getversion.php.

🔍 How to Verify

Check if Vulnerable:

Test by sending a request to http://<fog-server>/fog/management/getversion.php?newService=1&url=http://localhost. If it returns internal information, the system is vulnerable.

Check Version:

Check the FOG web interface dashboard or run: cat /var/www/html/fog/lib/fog/config.class.php | grep FOG_VERSION

Verify Fix Applied:

After applying workarounds, the same test request should return an error or be blocked entirely.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to getversion.php with url parameter containing internal IP addresses or domains
  • Unusual outbound connections from the FOG server to internal services

Network Indicators:

  • HTTP traffic to getversion.php with newService=1 parameter
  • Outbound connections from FOG server to unexpected internal services

SIEM Query:

source="fog-access.log" AND uri="/fog/management/getversion.php" AND query_string="*url=*"

🔗 References

📤 Share & Export