Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2020-17386: CWE-918 Server-Side Request Forgery (SSRF) in Cellopoint CelloOS

0
Medium
VulnerabilityCVE-2020-17386cvecve-2020-17386cwe-918
Published: Tue Aug 25 2020 (08/25/2020, 07:35:18 UTC)
Source: CVE
Vendor/Project: Cellopoint
Product: CelloOS

Description

Cellopoint CelloOS v4.1.10 Build 20190922 does not validate URL inputted properly. With cookie of an authenticated user, attackers can temper with the URL parameter and access arbitrary file on system.

AI-Powered Analysis

AILast updated: 07/05/2025, 07:40:37 UTC

Technical Analysis

CVE-2020-17386 is a Server-Side Request Forgery (SSRF) vulnerability identified in Cellopoint's CelloOS version 4.1.10 Build 20190922. The root cause of this vulnerability lies in improper validation of URL input parameters within the application. Specifically, an authenticated user with a valid session cookie can manipulate the URL parameter to coerce the server into making unintended requests or accessing arbitrary files on the underlying system. SSRF vulnerabilities typically allow attackers to abuse the server as a proxy to access internal resources that are otherwise inaccessible externally. In this case, the vulnerability enables an attacker to read arbitrary files on the server, potentially exposing sensitive configuration files, credentials, or other critical data. The vulnerability requires the attacker to be authenticated (PR:L) but does not require user interaction beyond that. The CVSS v3.1 base score is 6.5, indicating a medium severity level, with a high impact on confidentiality (C:H), no impact on integrity or availability, and the attack vector is network-based (AV:N) with low attack complexity (AC:L). No known exploits have been reported in the wild, and no patches are listed, which may indicate that organizations using this product need to verify vendor updates or implement compensating controls. The CWE classification is CWE-918, which corresponds to SSRF vulnerabilities, a common and dangerous class of flaws that can lead to data exposure and further internal network compromise if chained with other vulnerabilities.

Potential Impact

For European organizations using Cellopoint CelloOS, this SSRF vulnerability poses a significant risk to confidentiality of sensitive data hosted on affected servers. Attackers who gain authenticated access can leverage this flaw to read arbitrary files, potentially exposing credentials, internal configuration, or proprietary information. This can lead to data breaches, regulatory non-compliance (e.g., GDPR violations), and reputational damage. Since the vulnerability does not affect integrity or availability directly, the immediate risk is data leakage rather than service disruption. However, the ability to access internal files may facilitate further attacks, such as privilege escalation or lateral movement within the network. European organizations in sectors with high security requirements—such as finance, healthcare, and critical infrastructure—may face increased risk if they rely on CelloOS for operational systems. The lack of known exploits in the wild reduces immediate threat but does not eliminate risk, especially if attackers develop exploit code. The requirement for authenticated access limits exposure to insider threats or attackers who have compromised user credentials, emphasizing the importance of strong authentication and session management controls.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting access to the CelloOS management interface to trusted networks and users only, using network segmentation and firewall rules. 2. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise and unauthorized access. 3. Monitor and audit authenticated user activities for unusual URL parameter manipulations or file access attempts. 4. If possible, implement web application firewalls (WAFs) with custom rules to detect and block SSRF attack patterns targeting URL parameters. 5. Coordinate with Cellopoint to obtain any available patches or updates addressing this vulnerability; if none are available, request vendor guidance or consider compensating controls. 6. Conduct internal vulnerability assessments and penetration testing focusing on SSRF and related input validation issues in CelloOS deployments. 7. Limit the privileges of authenticated users to the minimum necessary to reduce potential impact. 8. Review and harden server file permissions to prevent unauthorized file reads even if SSRF is exploited. 9. Educate administrators and users about the risks of SSRF and the importance of secure session management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
twcert
Date Reserved
2020-08-07T00:00:00
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd87b0

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 7:40:37 AM

Last updated: 2/7/2026, 2:58:33 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats