Back-End Server-Side Request Forgery Vulnerability in Product Y
CVE-2024-3448

5MEDIUM

Key Information:

Vendor
Mautic
Status
Vendor
CVE Published:
10 April 2024

Badges

👾 Exploit Exists

Summary

A security vulnerability enables users with low privileges to execute certain AJAX actions without proper authorization. Specifically, an improper configuration allows access to the endpoint ajax?action=plugin:focus:checkIframeAvailability. By leveraging the error messages returned by the server, an attacker can initiate a server-side request forgery (SSRF) attack, which permits them to conduct port scanning on the backend. Currently, there is no patch available to mitigate this security issue, posing a future risk to the application's integrity.

Affected Version(s)

Mautic 0 <= 4.4.9

References

CVSS V3.1

Score:
5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

ZHAW Information Security Research Group
.