Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34453: n/a

0
Medium
VulnerabilityCVE-2024-34453cvecve-2024-34453
Published: Fri May 03 2024 (05/03/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

TwoNav 2.1.13 contains an SSRF vulnerability via the url paramater to index.php?c=api&method=read_data&type=connectivity_test (which reaches /system/api.php).

AI-Powered Analysis

AILast updated: 02/26/2026, 04:43:45 UTC

Technical Analysis

CVE-2024-34453 identifies a Server-Side Request Forgery (SSRF) vulnerability in the TwoNav navigation software version 2.1.13. The flaw exists in the handling of the 'url' parameter passed to the API endpoint index.php with parameters c=api, method=read_data, and type=connectivity_test. This endpoint internally invokes /system/api.php, which processes the URL parameter without sufficient validation or sanitization. As a result, an attacker can craft a malicious URL that causes the server to initiate HTTP requests to arbitrary destinations, potentially including internal or protected network resources that are otherwise inaccessible externally. SSRF vulnerabilities can be leveraged to perform internal network scanning, access metadata services, or retrieve sensitive information from internal systems. The vulnerability does not require authentication (PR:N) but does require user interaction (UI:R), indicating that the attacker must trick a user into triggering the request. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) shows that the attack is network-based, low complexity, no privileges required, user interaction needed, unchanged scope, with limited confidentiality impact and no integrity or availability impact. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. The vulnerability is classified under CWE-918 (SSRF).

Potential Impact

The primary impact of this SSRF vulnerability is the potential for attackers to use the vulnerable TwoNav server as a proxy to access internal network resources that are not directly reachable from the internet. This can lead to unauthorized information disclosure, such as accessing internal APIs, metadata services, or sensitive configuration endpoints. While the vulnerability does not directly affect data integrity or availability, it can be a stepping stone for further attacks, including lateral movement or reconnaissance within an organization's network. Organizations relying on TwoNav 2.1.13, especially those in sectors where geolocation and navigation data are critical (e.g., logistics, defense, outdoor recreation), may face increased risk of internal network exposure. The requirement for user interaction reduces the likelihood of automated widespread exploitation but does not eliminate targeted attacks. The medium CVSS score reflects these moderate risks.

Mitigation Recommendations

To mitigate CVE-2024-34453, organizations should first check for and apply any official patches or updates from TwoNav addressing this SSRF vulnerability. In the absence of patches, implement strict input validation and sanitization on the 'url' parameter to ensure only allowed and safe URLs can be processed. Employ network-level controls such as firewall rules or web application firewalls (WAFs) to restrict outbound HTTP requests from the TwoNav server to only trusted destinations. Monitor logs for unusual outbound requests originating from the affected endpoint. Additionally, educate users about the risks of interacting with untrusted links or content that could trigger the vulnerability. Segmentation of internal networks can limit the potential impact if SSRF is exploited. Finally, consider disabling or restricting the vulnerable API endpoint if it is not essential for operations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-03T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c50b7ef31ef0b5627d1

Added to database: 2/25/2026, 9:40:32 PM

Last enriched: 2/26/2026, 4:43:45 AM

Last updated: 2/26/2026, 9:33:50 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats