Plattform
other
Komponente
ltcms
Behoben in
1.0.21
CVE-2024-7740 is a critical server-side request forgery (SSRF) vulnerability discovered in ltcms versions 1.0.20–1.0.20. This flaw allows attackers to manipulate internal requests, potentially exposing sensitive data or gaining unauthorized access. The vulnerability resides in the /api/test/download endpoint and has been publicly disclosed. A fix is available in version 1.0.21.
The SSRF vulnerability in ltcms allows an attacker to craft malicious requests through the /api/test/download endpoint. By manipulating the 'url' parameter, an attacker can force the server to make requests to arbitrary internal or external resources. This could lead to the exposure of sensitive data stored within the internal network, such as configuration files, database credentials, or internal API endpoints. Furthermore, an attacker could potentially use this vulnerability to scan the internal network for other vulnerable services or to perform actions on behalf of the server, escalating their privileges. The public disclosure and availability of an exploit significantly increase the risk of exploitation.
CVE-2024-7740 has been publicly disclosed, and a proof-of-concept exploit is available, indicating a high probability of exploitation. The vulnerability was reported on 2024-08-13. The vendor was contacted but did not respond. This lack of response increases the urgency to apply the patch or implement mitigating controls. The vulnerability is not currently listed on CISA KEV as of this writing.
Organizations deploying ltcms version 1.0.20–1.0.20 are at immediate risk. Environments with limited network segmentation or those exposing the ltcms API endpoint directly to the internet are particularly vulnerable. Shared hosting environments utilizing ltcms should also be considered at high risk.
• linux / server:
journalctl -u ltcms -g 'api/test/download'• generic web:
curl -I <ltcms_server>/api/test/download?url=http://internal-resource.local | grep -i 'internal-resource.local'disclosure
Exploit-Status
EPSS
0.26% (49% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2024-7740 is to upgrade ltcms to version 1.0.21 or later, which contains the fix for this vulnerability. If upgrading is not immediately feasible, consider implementing temporary workarounds such as restricting outbound network access from the ltcms server to only necessary destinations. Implement strict input validation on the 'url' parameter in the /api/test/download endpoint to prevent malicious input. Web application firewalls (WAFs) configured to detect and block SSRF attempts can also provide a layer of protection. Monitor ltcms logs for suspicious outbound requests originating from the /api/test/download endpoint.
Aktualisieren Sie auf eine gepatchte Version oder kontaktieren Sie den Anbieter, um eine Lösung zu erhalten. Da keine korrigierte Version verfügbar ist, wird empfohlen, den Zugriff auf den Endpoint /api/test/download zu deaktivieren oder einzuschränken, bis ein Update veröffentlicht wird. Überwachen Sie den Netzwerkverkehr auf mögliche Exploit-Versuche.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2024-7740 is a critical server-side request forgery (SSRF) vulnerability affecting ltcms versions 1.0.20–1.0.20, allowing attackers to manipulate internal requests.
If you are running ltcms version 1.0.20–1.0.20, you are affected by this vulnerability. Upgrade immediately.
Upgrade ltcms to version 1.0.21 or later to resolve the SSRF vulnerability. Implement input validation as a temporary workaround.
Due to the public disclosure and availability of a proof-of-concept, CVE-2024-7740 is likely being actively exploited.
As of this writing, the vendor has not released an official advisory. Monitor the ltcms project website for updates.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.