CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-39338

Critical Severity
Axios
SVRS
71/100

CVSSv3
7.5/10

EPSS
0.00026/1

CVE-2024-39338 is a Server-Side Request Forgery (SSRF) vulnerability in axios version 1.7.2. This vulnerability arises from the improper handling of path-relative URLs, which are mistakenly processed as protocol-relative URLs, potentially allowing attackers to make unauthorized requests. While the CVSS score is 7.5, the SOCRadar Vulnerability Risk Score (SVRS) is 71, indicating a significant risk requiring close attention. Exploiting this vulnerability could enable an attacker to access internal resources or interact with other systems on the server's network. The ability to manipulate requests made from the server can have severe consequences, including data theft, privilege escalation, and denial of service. Addressing CVE-2024-39338 is crucial to prevent unauthorized access and maintain the integrity of web applications that utilize the affected axios version. Upgrade to a patched version of axios to mitigate the SSRF risk.

No tags available
CVSS:3.1
AV:N
AC:L
PR:N
UI:N
S:U
C:H
I:N
A:N
2024-08-12

2024-08-23
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-39338 is a Server-Side Request Forgery (SSRF) vulnerability in axios 1.7.2. It arises due to unexpected behavior where requests for path-relative URLs are processed as protocol-relative URLs. This allows an attacker to send requests to arbitrary URLs on the server, potentially leading to sensitive data disclosure, remote code execution, or other malicious activities. The SVRS for this CVE is 71, indicating a high severity and the need for immediate attention.

Key Insights

  • Exploitation: Active exploits have been published, and the vulnerability is being actively exploited in the wild.
  • Threat Actors: Specific threat actors or APT groups exploiting this vulnerability have not been identified.
  • CISA Warning: The Cybersecurity and Infrastructure Security Agency (CISA) has warned of this vulnerability, calling for immediate and necessary measures.
  • Impact: This vulnerability can allow attackers to bypass security controls, access sensitive data, and execute arbitrary code on the server.

Mitigation Strategies

  • Update axios: Update axios to version 1.7.3 or later, which addresses this vulnerability.
  • Implement input validation: Validate all user-supplied input to ensure that it does not contain malicious URLs.
  • Use a web application firewall (WAF): Configure a WAF to block requests that match the pattern of this vulnerability.
  • Monitor for suspicious activity: Monitor logs and network traffic for any suspicious activity that may indicate exploitation of this vulnerability.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

Security Bulletin: IBM QRadar Deployment Intelligence app for IBM QRadar SIEM is vulnerable to using a component with a known vulnerability (CVE-2024-39338)
2024-11-01
Security Bulletin: IBM QRadar Deployment Intelligence app for IBM QRadar SIEM is vulnerable to using a component with a known vulnerability (CVE-2024-39338) | The product includes a vulnerable component (e.g., framework libraries) that may be identified and exploited with automated tools. IBM QRadar Deployment Intelligence app for IBM QRadar SIEM has addressed the applicable CVE.
ibm.com
rss
forum
news

Social Media

CVE-2024-39338 (CVSS:7.5, HIGH) is Undergoing Analysis. axios 1.7.2 allows SSRF via unexpected behavior where requests for path relative URLs get processed as protocol relative..https://t.co/kx7s8MgoSa #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
0
0
0

Affected Software

Configuration 1
TypeVendorProduct
AppAxiosaxios

References

ReferenceLink
[email protected]https://github.com/axios/axios/releases
[email protected]https://jeffhacks.com/advisories/2024/06/24/CVE-2024-39338.html

CWE Details

CWE IDCWE NameDescription
CWE-918Server-Side Request Forgery (SSRF)The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence