Skip to content

Commit

Permalink
Added CVE-2024-24759 Template
Browse files Browse the repository at this point in the history
Fixed CVE-2024-24759 Template

Fixed CVE-2024-24759 Template

Fix impact, typo

Fixed CVE-2024-24759 Template

Updated CVE-2024-24759 Template

Enhance matcher checks
  • Loading branch information
eeche committed Jan 29, 2025
1 parent 2db116d commit e70f641
Showing 1 changed file with 47 additions and 0 deletions.
47 changes: 47 additions & 0 deletions http/cves/2024/CVE-2024-24759.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
id: CVE-2024-24759

info:
name: DNS Rebinding SSRF Protection Bypass
author: Lee Changhyun(eeche)
severity: high
description: |
Detects DNS rebinding vulnerability that allows bypass of SSRF protection.
The vulnerability exists in the URL validation mechanism where DNS resolution
is performed without considering DNS rebinding attacks.
impact: SSRF Protection Bypass via DNS Rebinding
remediation: |
Upgrade to mindsdb version 23.12.4.2 or later
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2024-24759
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
cvss-score: 9.1
cve-id: CVE-2024-24759
cwe-id: CWE-918
epss-score: 0.00084
epss-percentile: 0.37577
cpe: cpe:2.3:a:mindsdb:mindsdb:*:*:*:*:*:*:*:*
metadata:
max-request: 3
vendor: mindsdb
product: mindsdb
version: < 23.12.4.2
tags: cve, cve2024, mindsdb, ssrf, dns-rebinding

http:
- raw:
- |
GET /check_private_url?url=https://{{interactsh-url}}/ HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol
words:
- "http"
- type: word
part: interactsh_request
words:
- "/check_private_url"

Check failure on line 47 in http/cves/2024/CVE-2024-24759.yaml

View workflow job for this annotation

GitHub Actions / lint

47:1 [empty-lines] too many blank lines (1 > 0)

0 comments on commit e70f641

Please sign in to comment.