Skip to main content

CVE-2024-0403: CWE-918 Server-Side Request Forgery (SSRF) in Recipes Recipes

Medium
VulnerabilityCVE-2024-0403cvecve-2024-0403cwe-918
Published: Thu Feb 29 2024 (02/29/2024, 23:31:15 UTC)
Source: CVE
Vendor/Project: Recipes
Product: Recipes

Description

Recipes version 1.5.10 allows arbitrary HTTP requests to be made through the server. This is possible because the application is vulnerable to SSRF.

AI-Powered Analysis

AILast updated: 07/04/2025, 14:26:13 UTC

Technical Analysis

CVE-2024-0403 is a Server-Side Request Forgery (SSRF) vulnerability identified in the Recipes application, specifically version 1.5.10. SSRF vulnerabilities occur when an attacker can abuse a server's functionality to make HTTP requests to arbitrary locations, potentially accessing internal or protected resources that are not directly accessible from the outside. In this case, the Recipes application allows arbitrary HTTP requests to be made through the server without proper validation or restrictions. This means an attacker can craft requests that the server will execute, potentially targeting internal services, cloud metadata endpoints, or other sensitive network resources. The vulnerability is classified under CWE-918, which covers SSRF issues. The CVSS 3.1 base score is 6.5 (medium severity), with the vector indicating that the attack can be performed remotely over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality and integrity to a limited extent (C:L/I:L), but does not affect availability (A:N). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was published on February 29, 2024, and was reserved earlier in January 2024. The lack of authentication or user interaction requirements increases the risk of exploitation, though the impact is limited to partial confidentiality and integrity loss. Attackers could potentially use this SSRF to access internal APIs, retrieve sensitive data, or perform reconnaissance within the internal network, depending on the server's network environment and the resources accessible from it.

Potential Impact

For European organizations using the Recipes application version 1.5.10, this SSRF vulnerability poses a moderate risk. If exploited, attackers could leverage the server to access internal network resources that are otherwise protected by firewalls or network segmentation. This could lead to unauthorized disclosure of sensitive information, such as internal APIs, configuration data, or cloud metadata services that might contain credentials or tokens. The integrity impact suggests attackers might manipulate or inject data into internal services if those services are reachable and vulnerable. While availability is not directly affected, the breach of confidentiality and integrity could lead to further attacks or data leaks. European organizations with sensitive internal networks or those relying on Recipes for critical business functions should be particularly cautious. The risk is heightened in environments where the server has broad network access or where internal services lack robust authentication. Additionally, compliance with GDPR and other data protection regulations means that any data leakage could result in regulatory penalties and reputational damage.

Mitigation Recommendations

To mitigate this SSRF vulnerability, European organizations should: 1) Immediately assess if they are running Recipes version 1.5.10 and plan for an upgrade or patch once available. 2) Implement network-level controls such as egress filtering and firewall rules to restrict the server's ability to make outbound HTTP requests to only trusted destinations. 3) Employ application-layer input validation and sanitization to restrict or validate URLs or endpoints that the server can access, preventing arbitrary request injection. 4) Use network segmentation to isolate the server hosting Recipes from sensitive internal resources and metadata services. 5) Monitor logs for unusual outbound HTTP requests originating from the Recipes server to detect potential exploitation attempts. 6) Consider deploying Web Application Firewalls (WAFs) with rules targeting SSRF patterns to block malicious requests. 7) Educate development and operations teams about SSRF risks and secure coding practices to prevent similar vulnerabilities in future releases.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Fluid Attacks
Date Reserved
2024-01-10T16:40:59.115Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb6f7

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/4/2025, 2:26:13 PM

Last updated: 8/17/2025, 11:20:29 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats