Back-End Server-Side Request Forgery Vulnerability in Product Y
CVE-2024-3448
5MEDIUM
Summary
A security vulnerability enables users with low privileges to execute certain AJAX actions without proper authorization. Specifically, an improper configuration allows access to the endpoint ajax?action=plugin:focus:checkIframeAvailability. By leveraging the error messages returned by the server, an attacker can initiate a server-side request forgery (SSRF) attack, which permits them to conduct port scanning on the backend. Currently, there is no patch available to mitigate this security issue, posing a future risk to the application's integrity.
Affected Version(s)
Mautic 0 <= 4.4.9
References
CVSS V3.1
Score:
5
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
ZHAW Information Security Research Group