CVE-2024-0304: CWE-918 Server-Side Request Forgery in Youke365
A vulnerability has been found in Youke365 up to 1.5.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /app/api/controller/collect.php. The manipulation of the argument url leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249871.
AI Analysis
Technical Summary
CVE-2024-0304 is a server-side request forgery (SSRF) vulnerability identified in Youke365 versions up to 1.5.3, specifically within the /app/api/controller/collect.php file. The vulnerability arises from improper validation or sanitization of the 'url' argument, allowing an attacker to manipulate this parameter to make the server perform unintended HTTP requests. SSRF vulnerabilities enable attackers to coerce the vulnerable server into initiating requests to internal or external systems, potentially bypassing firewall restrictions or accessing sensitive internal resources. In this case, the vulnerability can be exploited remotely without user interaction but requires some level of privileges (as indicated by the CVSS vector's PR:L). The CVSS 3.1 base score is 6.3 (medium severity), reflecting that the vulnerability impacts confidentiality, integrity, and availability to a limited extent. Although no public exploits are currently known in the wild, the vulnerability has been disclosed publicly, increasing the risk of exploitation. The lack of available patches or vendor advisories at the time of publication suggests that affected organizations must implement mitigations proactively. The CWE-918 classification confirms the SSRF nature of the flaw, which is a common vector for lateral movement, data exfiltration, and internal network reconnaissance in targeted attacks.
Potential Impact
For European organizations using Youke365 versions 1.5.0 through 1.5.3, this SSRF vulnerability poses a significant risk. Exploitation could allow attackers to access internal services that are otherwise inaccessible from the internet, potentially leading to unauthorized data access, internal network mapping, or pivoting to more critical systems. Confidentiality could be compromised if sensitive internal endpoints are exposed. Integrity and availability impacts are also possible if attackers leverage SSRF to trigger unintended actions or denial-of-service conditions on internal services. Given that Youke365 is a web-based application, organizations relying on it for business-critical operations could face operational disruptions. The medium CVSS score reflects that exploitation requires some privileges, which may limit the attack surface but does not eliminate risk, especially in environments with weak access controls. European organizations with sensitive internal networks or regulatory requirements (e.g., GDPR) must consider the potential compliance and reputational impacts of such a vulnerability.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the vulnerable endpoint (/app/api/controller/collect.php) via network-level controls such as web application firewalls (WAFs) or IP whitelisting to limit exposure. 2. Implement strict input validation and sanitization on the 'url' parameter to ensure only allowed, safe URLs can be processed, ideally using a whitelist approach. 3. Employ network segmentation and firewall rules to prevent the application server from making arbitrary outbound requests to internal resources. 4. Monitor logs for unusual outbound requests originating from the application server to detect potential exploitation attempts. 5. If possible, upgrade or patch Youke365 to a version that addresses this vulnerability once available. 6. Conduct a thorough security review of all components interacting with Youke365 to identify and remediate any chained vulnerabilities. 7. Educate administrators and developers about SSRF risks and secure coding practices to prevent similar issues in the future.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2024-0304: CWE-918 Server-Side Request Forgery in Youke365
Description
A vulnerability has been found in Youke365 up to 1.5.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /app/api/controller/collect.php. The manipulation of the argument url leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249871.
AI-Powered Analysis
Technical Analysis
CVE-2024-0304 is a server-side request forgery (SSRF) vulnerability identified in Youke365 versions up to 1.5.3, specifically within the /app/api/controller/collect.php file. The vulnerability arises from improper validation or sanitization of the 'url' argument, allowing an attacker to manipulate this parameter to make the server perform unintended HTTP requests. SSRF vulnerabilities enable attackers to coerce the vulnerable server into initiating requests to internal or external systems, potentially bypassing firewall restrictions or accessing sensitive internal resources. In this case, the vulnerability can be exploited remotely without user interaction but requires some level of privileges (as indicated by the CVSS vector's PR:L). The CVSS 3.1 base score is 6.3 (medium severity), reflecting that the vulnerability impacts confidentiality, integrity, and availability to a limited extent. Although no public exploits are currently known in the wild, the vulnerability has been disclosed publicly, increasing the risk of exploitation. The lack of available patches or vendor advisories at the time of publication suggests that affected organizations must implement mitigations proactively. The CWE-918 classification confirms the SSRF nature of the flaw, which is a common vector for lateral movement, data exfiltration, and internal network reconnaissance in targeted attacks.
Potential Impact
For European organizations using Youke365 versions 1.5.0 through 1.5.3, this SSRF vulnerability poses a significant risk. Exploitation could allow attackers to access internal services that are otherwise inaccessible from the internet, potentially leading to unauthorized data access, internal network mapping, or pivoting to more critical systems. Confidentiality could be compromised if sensitive internal endpoints are exposed. Integrity and availability impacts are also possible if attackers leverage SSRF to trigger unintended actions or denial-of-service conditions on internal services. Given that Youke365 is a web-based application, organizations relying on it for business-critical operations could face operational disruptions. The medium CVSS score reflects that exploitation requires some privileges, which may limit the attack surface but does not eliminate risk, especially in environments with weak access controls. European organizations with sensitive internal networks or regulatory requirements (e.g., GDPR) must consider the potential compliance and reputational impacts of such a vulnerability.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the vulnerable endpoint (/app/api/controller/collect.php) via network-level controls such as web application firewalls (WAFs) or IP whitelisting to limit exposure. 2. Implement strict input validation and sanitization on the 'url' parameter to ensure only allowed, safe URLs can be processed, ideally using a whitelist approach. 3. Employ network segmentation and firewall rules to prevent the application server from making arbitrary outbound requests to internal resources. 4. Monitor logs for unusual outbound requests originating from the application server to detect potential exploitation attempts. 5. If possible, upgrade or patch Youke365 to a version that addresses this vulnerability once available. 6. Conduct a thorough security review of all components interacting with Youke365 to identify and remediate any chained vulnerabilities. 7. Educate administrators and developers about SSRF risks and secure coding practices to prevent similar issues in the future.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-07T20:00:50.705Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0dc2182aa0cae27ff41c
Added to database: 6/3/2025, 2:59:14 PM
Last enriched: 7/3/2025, 11:58:01 PM
Last updated: 7/27/2025, 1:10:47 AM
Views: 12
Related Threats
CVE-2025-7679: CWE-306 Missing Authentication for Critical Function in ABB Aspect
HighCVE-2025-7677: CWE-306 Missing Authentication for Critical Function in ABB Aspect
MediumCVE-2025-53191: CWE-306 Missing Authentication for Critical Function in ABB Aspect
HighCVE-2025-53190: CWE-286 in ABB Aspect
HighCVE-2025-53189: CWE-639 Authorization Bypass Through User-Controlled Key in ABB Aspect
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.