CVE-2024-39713: Rocket.Chat Server-Side Request Forgery (SSRF) vulnerability
8.6
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.98985%
CWE
Published
8/5/2024
Updated
8/30/2024
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| rocket.chat | npm | < 6.10.1 | 6.10.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from missing SSRF protections in URL fetching operations. The commit adds a new checkUrlForSsrf.ts module and modifies these functions to implement DNS resolution checks, IP range validation, and domain restrictions. The affected functions handled user-supplied URLs for avatars and SMS attachments without validating if the target URLs resolved to internal/restricted network resources. The high confidence comes from the direct correlation between the vulnerability description ('Twilio webhook SSRF') and the patched file paths related to external resource fetching.