Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51408: n/a

0
High
VulnerabilityCVE-2024-51408cvecve-2024-51408
Published: Mon Nov 04 2024 (11/04/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-51408 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in AppSmith Community versions before 1. 46. It allows attackers to send crafted application/json requests via the New DataSource feature to the internal IP 169. 254. 169. 254, which is the AWS metadata service endpoint. Exploiting this vulnerability enables attackers with low privileges to retrieve sensitive AWS metadata credentials, potentially leading to full compromise of AWS resources. The vulnerability requires no user interaction but does require some level of privilege (low) on the AppSmith instance. The vulnerability has a CVSS score of 8. 5, indicating a significant risk to confidentiality, integrity, and availability.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:30:47 UTC

Technical Analysis

CVE-2024-51408 is a Server-Side Request Forgery (SSRF) vulnerability affecting AppSmith Community editions prior to version 1.46. The flaw exists in the New DataSource feature, which processes application/json requests and allows attackers to craft requests that target the AWS metadata service endpoint at 169.254.169.254. This internal IP is used by AWS EC2 instances to provide metadata and temporary credentials to applications running on the instance. By exploiting this SSRF, an attacker with low privileges on the AppSmith platform can trick the server into making HTTP requests to the metadata service, thereby retrieving sensitive AWS credentials. These credentials can then be used to escalate privileges, access AWS resources, or move laterally within the cloud environment. The vulnerability is particularly dangerous because it does not require user interaction and can lead to a complete compromise of AWS accounts linked to the vulnerable AppSmith instance. The CVSS 3.1 score of 8.5 reflects high impact on confidentiality, integrity, and availability, with a complex attack vector requiring low privileges but no user interaction. The vulnerability is categorized under CWE-918 (Server-Side Request Forgery). No patches or exploits have been publicly disclosed at the time of publication, but the risk remains significant for organizations using affected versions in AWS environments.

Potential Impact

The primary impact of CVE-2024-51408 is the unauthorized disclosure of AWS metadata credentials, which can lead to full compromise of AWS cloud resources. Attackers gaining these credentials can access sensitive data, modify or delete cloud infrastructure, deploy malicious workloads, or disrupt services. This can result in data breaches, service outages, financial losses, and reputational damage. Since the vulnerability allows privilege escalation within the cloud environment, it poses a critical risk to organizations relying on AppSmith for application development and deployment in AWS. The SSRF nature of the vulnerability means that internal network resources beyond the metadata service could potentially be targeted if further chained with other vulnerabilities. Organizations with automated cloud workflows, sensitive data hosted on AWS, or critical infrastructure managed via AppSmith are at heightened risk. The lack of known exploits in the wild provides a limited window for proactive mitigation before potential attacks emerge.

Mitigation Recommendations

1. Upgrade AppSmith Community to version 1.46 or later, where this SSRF vulnerability is fixed. 2. If immediate upgrade is not possible, implement network-level restrictions to block outbound HTTP requests from AppSmith servers to the 169.254.169.254 metadata IP address. 3. Use AWS IAM roles with the least privilege principle to limit the scope of credentials accessible via the metadata service. 4. Employ AWS Instance Metadata Service Version 2 (IMDSv2), which requires session tokens and reduces SSRF risks. 5. Monitor application logs and network traffic for unusual requests targeting internal IPs or metadata endpoints. 6. Conduct regular security assessments and penetration tests focusing on SSRF and cloud metadata exposure. 7. Educate developers and administrators about SSRF risks and secure coding practices when handling user-supplied URLs or JSON inputs. 8. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SSRF attempts targeting internal IP ranges.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bb3b7ef31ef0b55a2c3

Added to database: 2/25/2026, 9:37:55 PM

Last enriched: 2/26/2026, 1:30:47 AM

Last updated: 2/26/2026, 6:27:01 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats