CVE-2024-8952
Published: 20 March 2025
Summary
CVE-2024-8952 is a high-severity SSRF (CWE-918) vulnerability in Composio Composio. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 35.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Validates user-supplied URLs at the WEBTOOL_SCRAPE_WEBSITE_CONTENT endpoint to block crafted inputs targeting internal files, AWS metadata, or local services.
Enforces flow control policies restricting the endpoint's requests to authorized external destinations only, preventing SSRF access to internal resources.
Provides boundary protection through egress filtering and monitoring to block or identify SSRF-induced connections to localhost or metadata services.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SSRF in public-facing /api endpoint directly enables T1190; facilitates local file reads (T1005) and AWS instance metadata access (T1552.005).
NVD Description
A Server-Side Request Forgery (SSRF) vulnerability exists in composiohq/composio version v0.4.2, specifically in the /api/actions/execute/WEBTOOL_SCRAPE_WEBSITE_CONTENT endpoint. This vulnerability allows an attacker to read files, access AWS metadata, and interact with local services on the system.
Deeper analysisAI
CVE-2024-8952 is a Server-Side Request Forgery (SSRF) vulnerability, mapped to CWE-918, affecting composiohq/composio version v0.4.2. The flaw exists specifically in the /api/actions/execute/WEBTOOL_SCRAPE_WEBSITE_CONTENT endpoint. Published on 2025-03-20, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), reflecting high confidentiality impact from network-accessible exploitation with low complexity and no privileges or user interaction required.
An unauthenticated remote attacker can exploit this SSRF vulnerability by sending crafted requests to the affected endpoint. This enables the attacker to read arbitrary files on the server, access AWS instance metadata services, and interact with other local services running on the host system.
Details on mitigation and patches are available in the advisory published on Huntr.com at https://huntr.com/bounties/d1acdd38-10d7-45df-9df0-9fc71f0e1c2a.
Details
- CWE(s)