Skip to main content

CVE-2024-0304: CWE-918 Server-Side Request Forgery in Youke365

Medium
VulnerabilityCVE-2024-0304cvecve-2024-0304cwe-918
Published: Mon Jan 08 2024 (01/08/2024, 08:00:05 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: Youke365

Description

A vulnerability has been found in Youke365 up to 1.5.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /app/api/controller/collect.php. The manipulation of the argument url leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249871.

AI-Powered Analysis

AILast updated: 07/03/2025, 23:58:01 UTC

Technical Analysis

CVE-2024-0304 is a server-side request forgery (SSRF) vulnerability identified in Youke365 versions up to 1.5.3, specifically within the /app/api/controller/collect.php file. The vulnerability arises from improper validation or sanitization of the 'url' argument, allowing an attacker to manipulate this parameter to make the server perform unintended HTTP requests. SSRF vulnerabilities enable attackers to coerce the vulnerable server into initiating requests to internal or external systems, potentially bypassing firewall restrictions or accessing sensitive internal resources. In this case, the vulnerability can be exploited remotely without user interaction but requires some level of privileges (as indicated by the CVSS vector's PR:L). The CVSS 3.1 base score is 6.3 (medium severity), reflecting that the vulnerability impacts confidentiality, integrity, and availability to a limited extent. Although no public exploits are currently known in the wild, the vulnerability has been disclosed publicly, increasing the risk of exploitation. The lack of available patches or vendor advisories at the time of publication suggests that affected organizations must implement mitigations proactively. The CWE-918 classification confirms the SSRF nature of the flaw, which is a common vector for lateral movement, data exfiltration, and internal network reconnaissance in targeted attacks.

Potential Impact

For European organizations using Youke365 versions 1.5.0 through 1.5.3, this SSRF vulnerability poses a significant risk. Exploitation could allow attackers to access internal services that are otherwise inaccessible from the internet, potentially leading to unauthorized data access, internal network mapping, or pivoting to more critical systems. Confidentiality could be compromised if sensitive internal endpoints are exposed. Integrity and availability impacts are also possible if attackers leverage SSRF to trigger unintended actions or denial-of-service conditions on internal services. Given that Youke365 is a web-based application, organizations relying on it for business-critical operations could face operational disruptions. The medium CVSS score reflects that exploitation requires some privileges, which may limit the attack surface but does not eliminate risk, especially in environments with weak access controls. European organizations with sensitive internal networks or regulatory requirements (e.g., GDPR) must consider the potential compliance and reputational impacts of such a vulnerability.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the vulnerable endpoint (/app/api/controller/collect.php) via network-level controls such as web application firewalls (WAFs) or IP whitelisting to limit exposure. 2. Implement strict input validation and sanitization on the 'url' parameter to ensure only allowed, safe URLs can be processed, ideally using a whitelist approach. 3. Employ network segmentation and firewall rules to prevent the application server from making arbitrary outbound requests to internal resources. 4. Monitor logs for unusual outbound requests originating from the application server to detect potential exploitation attempts. 5. If possible, upgrade or patch Youke365 to a version that addresses this vulnerability once available. 6. Conduct a thorough security review of all components interacting with Youke365 to identify and remediate any chained vulnerabilities. 7. Educate administrators and developers about SSRF risks and secure coding practices to prevent similar issues in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-07T20:00:50.705Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc2182aa0cae27ff41c

Added to database: 6/3/2025, 2:59:14 PM

Last enriched: 7/3/2025, 11:58:01 PM

Last updated: 7/27/2025, 1:10:47 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats