Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48346: n/a

0
Medium
VulnerabilityCVE-2024-48346cvecve-2024-48346
Published: Wed Oct 30 2024 (10/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

xtreme1 <= v0.9.1 contains a Server-Side Request Forgery (SSRF) vulnerability in the /api/data/upload path. The vulnerability is triggered through the fileUrl parameter, which allows an attacker to make arbitrary requests to internal or external systems.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:48:16 UTC

Technical Analysis

CVE-2024-48346 identifies a Server-Side Request Forgery (SSRF) vulnerability in the xtreme1 software up to version 0.9.1. The vulnerability is located in the /api/data/upload endpoint, where the fileUrl parameter is used to specify a resource location. Due to insufficient validation or sanitization of this parameter, an attacker can craft a request that causes the server to perform arbitrary HTTP requests on behalf of the attacker. This can be leveraged to access internal network resources that are otherwise inaccessible externally, potentially exposing sensitive internal services or data. The SSRF can also be used to interact with external systems, possibly facilitating further attacks or data exfiltration. The vulnerability does not require authentication (PR:N) but does require user interaction (UI:R), such as submitting a malicious request to the vulnerable endpoint. The CVSS v3.1 score of 6.1 reflects a medium severity, with low impact on confidentiality and integrity, and no impact on availability. No known exploits have been reported in the wild, and no official patches have been published at the time of disclosure. The vulnerability is classified under CWE-918 (Server-Side Request Forgery).

Potential Impact

The SSRF vulnerability allows attackers to make arbitrary requests from the vulnerable server, potentially exposing internal network services that are not directly accessible from the internet. This can lead to unauthorized access to sensitive information, internal APIs, or administrative interfaces. While the direct impact on confidentiality and integrity is rated low, the ability to pivot into internal networks can facilitate more severe attacks, including data breaches or lateral movement. The lack of required privileges lowers the barrier to exploitation, increasing risk. However, the need for user interaction and no known exploits in the wild somewhat limit immediate widespread impact. Organizations relying on xtreme1 in sensitive environments or with exposed API endpoints are at risk of targeted attacks leveraging this SSRF flaw.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict input validation and sanitization on the fileUrl parameter to ensure only allowed URLs or domains can be requested. Employ allowlisting of trusted domains and block requests to internal IP ranges (e.g., 10.0.0.0/8, 192.168.0.0/16, 127.0.0.0/8). Network segmentation and firewall rules should restrict the vulnerable server's ability to initiate outbound requests to sensitive internal services. Monitoring and logging of outbound requests from the server can help detect exploitation attempts. If possible, disable or restrict the /api/data/upload endpoint until a patch is available. Organizations should stay alert for official patches or updates from the xtreme1 maintainers and apply them promptly once released. Additionally, educating users about the risks of interacting with untrusted inputs can reduce the likelihood of successful exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d14b7ef31ef0b56db7b

Added to database: 2/25/2026, 9:43:48 PM

Last enriched: 2/28/2026, 7:48:16 AM

Last updated: 4/12/2026, 3:34:37 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses