Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33832: n/a

0
Medium
VulnerabilityCVE-2024-33832cvecve-2024-33832
Published: Tue Apr 30 2024 (04/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

OneNav v0.9.35-20240318 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /index.php?c=api&method=get_link_info.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:02:11 UTC

Technical Analysis

CVE-2024-33832 identifies a Server-Side Request Forgery (SSRF) vulnerability in the OneNav application, version 0.9.35-20240318. The vulnerability exists in the API endpoint /index.php?c=api&method=get_link_info, where insufficient validation of user-supplied URLs allows an attacker with at least limited privileges (PR:L) to coerce the server into making arbitrary HTTP requests. SSRF vulnerabilities enable attackers to interact with internal services that are otherwise inaccessible externally, potentially exposing sensitive information, bypassing firewalls, or facilitating further attacks such as port scanning, internal network reconnaissance, or exploiting other vulnerabilities on internal hosts. The CVSS 3.1 score of 6.3 reflects a medium severity, with the attack vector being network-based (AV:N), low complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability to a limited extent (C:L/I:L/A:L). No patches or known exploits are currently reported, but the vulnerability should be addressed promptly. The CWE-918 classification confirms the SSRF nature of the flaw. Given the nature of SSRF, attackers could leverage this vulnerability to access internal metadata services, sensitive APIs, or perform denial-of-service attacks on internal systems. The lack of user interaction and low complexity make this a viable attack vector for threat actors with some access to the system.

Potential Impact

The impact of CVE-2024-33832 is significant for organizations running vulnerable versions of OneNav, as SSRF vulnerabilities can lead to unauthorized access to internal systems, data leakage, and potential lateral movement within networks. Confidentiality may be compromised if attackers retrieve sensitive internal information or metadata. Integrity could be affected if attackers manipulate internal services or APIs through forged requests. Availability might be impacted if attackers use the SSRF to launch denial-of-service attacks against internal resources. Since the vulnerability requires some level of privilege, the risk is somewhat mitigated but still notable, especially in environments where user privileges are not tightly controlled. Organizations with OneNav deployments in critical infrastructure, government, or enterprise environments face increased risk due to the potential for internal network compromise and data exfiltration. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability is public.

Mitigation Recommendations

To mitigate CVE-2024-33832, organizations should first apply any available patches or updates from the OneNav vendor once released. In the absence of patches, implement strict input validation and sanitization on the /index.php?c=api&method=get_link_info endpoint to ensure only authorized and safe URLs can be requested. Employ allowlisting of outbound HTTP requests from the server to restrict connections to trusted domains and IP ranges, effectively preventing SSRF exploitation. Network segmentation should be enforced to limit the server's ability to reach sensitive internal services. Monitoring and logging of outbound requests can help detect anomalous activity indicative of SSRF attempts. Additionally, review and minimize user privileges to reduce the risk posed by attackers with limited access. Employ web application firewalls (WAFs) with SSRF detection capabilities to block suspicious requests. Regular security assessments and penetration testing focused on SSRF vectors can help identify and remediate weaknesses proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c47b7ef31ef0b561d8f

Added to database: 2/25/2026, 9:40:23 PM

Last enriched: 2/28/2026, 3:02:11 AM

Last updated: 4/12/2026, 1:09:54 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses