CVE-2022-41949: CWE-918: Server-Side Request Forgery (SSRF) in dhis2 dhis2-core
DHIS 2 is an open source information system for data capture, management, validation, analytics and visualization. In affected versions an authenticated DHIS2 user can craft a request to DHIS2 to instruct the server to make requests to external resources (like third party servers). This could allow an attacker, for example, to identify vulnerable services which might not be otherwise exposed to the public internet or to determine whether a specific file is present on the DHIS2 server. DHIS2 administrators should upgrade to the following hotfix releases: 2.36.12.1, 2.37.8.1, 2.38.2.1, 2.39.0.1. At this time, there is no known workaround or mitigation for this vulnerability.
AI Analysis
Technical Summary
CVE-2022-41949 is a Server-Side Request Forgery (SSRF) vulnerability identified in the dhis2-core component of DHIS 2, an open-source platform widely used for data capture, management, validation, analytics, and visualization, especially in health information systems. The vulnerability affects multiple versions of DHIS 2 prior to specific hotfix releases (2.36.12.1, 2.37.8.1, 2.38.2.1, and 2.39.0.1). An authenticated user within the DHIS 2 system can craft specially designed requests that cause the server to initiate HTTP requests to arbitrary external or internal resources. This behavior can be exploited to scan internal networks or services that are not publicly accessible, potentially exposing sensitive internal infrastructure details or confirming the presence of specific files on the DHIS 2 server. The vulnerability leverages the server's trust and network access, allowing attackers to bypass network restrictions and potentially gather intelligence for further attacks. Notably, exploitation requires authentication, limiting the attack surface to users with valid credentials. As of the publication date, no known exploits have been reported in the wild, and no alternative mitigations beyond upgrading to the patched versions are available. The vulnerability is classified under CWE-918, which pertains to SSRF issues where an attacker can abuse server functionality to make unintended requests. This SSRF flaw could be used as a reconnaissance tool or as a stepping stone for more advanced attacks if combined with other vulnerabilities or misconfigurations.
Potential Impact
For European organizations, especially those in the public health sector or NGOs using DHIS 2 for critical data management, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized internal network scanning, exposing sensitive infrastructure details that are otherwise protected by network segmentation or firewalls. This could facilitate lateral movement or targeted attacks against internal services. While direct data exfiltration or system compromise is not guaranteed solely by this SSRF, the reconnaissance capability significantly increases the attacker's situational awareness and attack surface. Given DHIS 2's role in managing health data, any compromise or misuse could undermine data integrity and confidentiality indirectly by enabling further attacks. The requirement for authentication reduces the likelihood of widespread exploitation but raises concerns about insider threats or compromised user credentials. The absence of known exploits suggests limited immediate risk, but the availability of patches means organizations not updating are vulnerable to future attacks. The impact on availability is minimal, but the confidentiality and integrity of internal systems and data could be at risk if SSRF is chained with other vulnerabilities.
Mitigation Recommendations
The primary and only effective mitigation is to upgrade DHIS 2 installations to the specified patched versions: 2.36.12.1, 2.37.8.1, 2.38.2.1, or 2.39.0.1, depending on the version in use. Organizations should prioritize patching in environments exposed to multiple users or where user credential compromise is more likely. Additionally, organizations should implement strict access controls and monitoring on DHIS 2 user accounts to detect unusual request patterns indicative of SSRF exploitation attempts. Network segmentation should be enforced to limit the server's ability to reach sensitive internal resources, minimizing the impact of SSRF if exploited. Web application firewalls (WAFs) can be tuned to detect and block suspicious outbound requests originating from the DHIS 2 server. Logging and alerting on outbound HTTP requests from the server can help identify exploitation attempts early. Finally, organizations should conduct regular audits of user privileges and enforce strong authentication mechanisms to reduce the risk of credential compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Norway, Denmark, Finland, Belgium, Italy
CVE-2022-41949: CWE-918: Server-Side Request Forgery (SSRF) in dhis2 dhis2-core
Description
DHIS 2 is an open source information system for data capture, management, validation, analytics and visualization. In affected versions an authenticated DHIS2 user can craft a request to DHIS2 to instruct the server to make requests to external resources (like third party servers). This could allow an attacker, for example, to identify vulnerable services which might not be otherwise exposed to the public internet or to determine whether a specific file is present on the DHIS2 server. DHIS2 administrators should upgrade to the following hotfix releases: 2.36.12.1, 2.37.8.1, 2.38.2.1, 2.39.0.1. At this time, there is no known workaround or mitigation for this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2022-41949 is a Server-Side Request Forgery (SSRF) vulnerability identified in the dhis2-core component of DHIS 2, an open-source platform widely used for data capture, management, validation, analytics, and visualization, especially in health information systems. The vulnerability affects multiple versions of DHIS 2 prior to specific hotfix releases (2.36.12.1, 2.37.8.1, 2.38.2.1, and 2.39.0.1). An authenticated user within the DHIS 2 system can craft specially designed requests that cause the server to initiate HTTP requests to arbitrary external or internal resources. This behavior can be exploited to scan internal networks or services that are not publicly accessible, potentially exposing sensitive internal infrastructure details or confirming the presence of specific files on the DHIS 2 server. The vulnerability leverages the server's trust and network access, allowing attackers to bypass network restrictions and potentially gather intelligence for further attacks. Notably, exploitation requires authentication, limiting the attack surface to users with valid credentials. As of the publication date, no known exploits have been reported in the wild, and no alternative mitigations beyond upgrading to the patched versions are available. The vulnerability is classified under CWE-918, which pertains to SSRF issues where an attacker can abuse server functionality to make unintended requests. This SSRF flaw could be used as a reconnaissance tool or as a stepping stone for more advanced attacks if combined with other vulnerabilities or misconfigurations.
Potential Impact
For European organizations, especially those in the public health sector or NGOs using DHIS 2 for critical data management, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized internal network scanning, exposing sensitive infrastructure details that are otherwise protected by network segmentation or firewalls. This could facilitate lateral movement or targeted attacks against internal services. While direct data exfiltration or system compromise is not guaranteed solely by this SSRF, the reconnaissance capability significantly increases the attacker's situational awareness and attack surface. Given DHIS 2's role in managing health data, any compromise or misuse could undermine data integrity and confidentiality indirectly by enabling further attacks. The requirement for authentication reduces the likelihood of widespread exploitation but raises concerns about insider threats or compromised user credentials. The absence of known exploits suggests limited immediate risk, but the availability of patches means organizations not updating are vulnerable to future attacks. The impact on availability is minimal, but the confidentiality and integrity of internal systems and data could be at risk if SSRF is chained with other vulnerabilities.
Mitigation Recommendations
The primary and only effective mitigation is to upgrade DHIS 2 installations to the specified patched versions: 2.36.12.1, 2.37.8.1, 2.38.2.1, or 2.39.0.1, depending on the version in use. Organizations should prioritize patching in environments exposed to multiple users or where user credential compromise is more likely. Additionally, organizations should implement strict access controls and monitoring on DHIS 2 user accounts to detect unusual request patterns indicative of SSRF exploitation attempts. Network segmentation should be enforced to limit the server's ability to reach sensitive internal resources, minimizing the impact of SSRF if exploited. Web application firewalls (WAFs) can be tuned to detect and block suspicious outbound requests originating from the DHIS 2 server. Logging and alerting on outbound HTTP requests from the server can help identify exploitation attempts early. Finally, organizations should conduct regular audits of user privileges and enforce strong authentication mechanisms to reduce the risk of credential compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-30T16:38:28.944Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf4d5a
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/22/2025, 12:20:17 PM
Last updated: 8/18/2025, 2:25:35 AM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.