CVE-2024-13139
Published: 05 January 2025
Summary
CVE-2024-13139 is a medium-severity SSRF (CWE-918) vulnerability in Wangl1989 Mysiteforme. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 21.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SC-7 (Boundary Protection) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly validates the manipulated 'content' argument in doContent to prevent SSRF by rejecting inputs that could induce unintended server requests.
Monitors and controls outbound communications at system boundaries to block or detect unauthorized requests triggered by SSRF exploitation.
Enforces approved information flows to restrict the server from making unauthorized internal or external requests via the vulnerable FileController.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SSRF vulnerability (CVE-2024-13139) in public-facing web app enables initial access via exploitation of public-facing application (T1190), local file reads facilitating data from local system (T1005), and file and directory discovery (T1083).
NVD Description
A vulnerability was found in wangl1989 mysiteforme 1.0. It has been rated as critical. This issue affects the function doContent of the file src/main/java/com/mysiteform/admin/controller/system/FileController. The manipulation of the argument content leads to server-side request forgery. The attack may be initiated…
more
remotely. The exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2024-13139 is a server-side request forgery (SSRF) vulnerability, rated as critical, affecting wangl1989 mysiteforme version 1.0. The issue is located in the doContent function of the FileController class at src/main/java/com/mysiteform/admin/controller/system/FileController, where manipulation of the content argument triggers the SSRF. It is associated with CWE-918 and carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L). The vulnerability was published on 2025-01-05.
An attacker can exploit this vulnerability remotely with low privileges, requiring no user interaction and low complexity. By manipulating the content argument, the attacker induces the server to make unintended requests, potentially leading to limited impacts on confidentiality, integrity, and availability.
Advisories and further details are documented in the project's GitHub repository at https://github.com/wangl1989/mysiteforme/issues/56 (including issue comment at #issue-2757876365) and on VulDB at https://vuldb.com/?ctiid.290213, https://vuldb.com/?id.290213, and https://vuldb.com/?submit.468513. The exploit has been disclosed publicly and may be used.
Details
- CWE(s)