CVE-2024-57767
Published: 15 January 2025
Summary
CVE-2024-57767 is a high-severity SSRF (CWE-918) vulnerability in Wangl1989 Mysiteforme. Its CVSS base score is 8.6 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 48.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of inputs to the /file/download component to block malicious URLs or parameters that enable SSRF.
Enforces information flow control policies to restrict the server from initiating unauthorized requests to internal or external resources via SSRF.
Implements boundary protection to monitor and control communications, limiting SSRF exploitation by blocking access to protected internal networks.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SSRF in /file/download allows authenticated attackers to force server requests to arbitrary URLs (http/file/etc.), enabling exploitation of the web application, internal network service/port discovery, cloud metadata API access, and local system data collection.
NVD Description
MSFM before v2025.01.01 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /file/download.
Deeper analysisAI
CVE-2024-57767 is a Server-Side Request Forgery (SSRF) vulnerability, classified under CWE-918, affecting MSFM versions prior to v2025.01.01. The issue resides in the /file/download component, as disclosed on January 15, 2025, with a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).
Unauthenticated attackers with network access can exploit this vulnerability with low complexity and no user interaction required. Exploitation allows attackers to induce the server to make unauthorized requests, potentially leading to high confidentiality impacts across a changed scope, such as accessing internal network resources.
The vulnerability is tracked in an advisory at https://gitee.com/wanglingxiao/mysiteforme/issues/IBFVM9. Mitigation requires upgrading to MSFM v2025.01.01 or later.
Details
- CWE(s)