Skip to main content

CVE-2024-24113: n/a in n/a

High
VulnerabilityCVE-2024-24113cvecve-2024-24113
Published: Thu Feb 08 2024 (02/08/2024, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

xxl-job =< 2.4.1 has a Server-Side Request Forgery (SSRF) vulnerability, which causes low-privileged users to control executor to RCE.

AI-Powered Analysis

AILast updated: 07/06/2025, 08:39:44 UTC

Technical Analysis

CVE-2024-24113 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting xxl-job versions up to and including 2.4.1. xxl-job is a distributed task scheduling framework commonly used in enterprise environments to manage and execute scheduled jobs. The vulnerability allows a low-privileged user to manipulate the executor component of xxl-job to perform remote code execution (RCE). SSRF vulnerabilities occur when an attacker can make the server-side application send crafted requests to unintended locations, potentially accessing internal systems or services that are otherwise inaccessible. In this case, the SSRF flaw enables attackers to control the executor, which is responsible for running scheduled tasks, thereby escalating their privileges and executing arbitrary code on the server. The CVSS 3.1 base score of 8.8 reflects the critical nature of this vulnerability, with network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits in the wild have been reported yet, but the vulnerability is publicly disclosed and could be targeted by threat actors. The CWE-918 classification confirms the SSRF nature of the issue. The lack of vendor or product information in the provided data suggests that the vulnerability is specific to the xxl-job project itself, which is widely used in Java-based distributed systems for job scheduling.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for enterprises relying on xxl-job for critical task automation and scheduling. Successful exploitation could lead to full system compromise, allowing attackers to execute arbitrary commands, access sensitive data, disrupt business operations, or pivot to other internal systems. This poses a risk to confidentiality, integrity, and availability of enterprise IT environments. Industries such as finance, manufacturing, telecommunications, and public sector entities that use xxl-job for backend automation could face operational disruptions and data breaches. Given the network-based attack vector and low complexity, attackers could exploit this vulnerability remotely without user interaction, increasing the risk of widespread attacks. The absence of known exploits currently provides a window for proactive mitigation, but the public disclosure increases the likelihood of exploit development. Organizations with compliance requirements under GDPR must also consider the regulatory implications of potential data breaches resulting from this vulnerability.

Mitigation Recommendations

European organizations should immediately assess their use of xxl-job and identify any instances running version 2.4.1 or earlier. Since no patch links are provided, organizations should monitor the official xxl-job project repositories and security advisories for patches or updates addressing CVE-2024-24113. In the interim, restrict network access to the xxl-job executor components to trusted internal IPs only, and implement strict firewall rules to limit exposure. Employ application-layer filtering and input validation to detect and block SSRF attack patterns. Conduct thorough code reviews and penetration testing focused on SSRF vectors within xxl-job integrations. Additionally, implement runtime application self-protection (RASP) or web application firewalls (WAFs) with SSRF detection capabilities. Enforce the principle of least privilege for users interacting with the xxl-job system to minimize the impact of compromised accounts. Finally, establish monitoring and alerting for unusual executor activity or unexpected outbound requests originating from the xxl-job service.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-25T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec3d3

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/6/2025, 8:39:44 AM

Last updated: 7/26/2025, 10:46:53 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats