CVE-2024-23336 (GCVE-0-2024-23336)
Vulnerability from cvelistv5 – Published: 2024-05-01 06:27 – Updated: 2024-08-01 22:59
VLAI?
Title
Incomplete disallowed remote addresses list in MyBB
Summary
MyBB is a free and open source forum software. The default list of disallowed remote hosts does not contain the `127.0.0.0/8` block, which may result in a Server-Side Request Forgery (SSRF) vulnerability. The Configuration File's _Disallowed Remote Addresses_ list (`$config['disallowed_remote_addresses']`) contains the address `127.0.0.1`, but does not include the complete block `127.0.0.0/8`. MyBB 1.8.38 resolves this issue in default installations. Administrators of installed boards should update the existing configuration (`inc/config.php`) to include all addresses blocked by default. Additionally, users are advised to verify that it includes any other IPv4 addresses resolving to the server and other internal resources. Users unable to upgrade may manually add 127.0.0.0/8' to their disallowed address list.
Severity ?
5 (Medium)
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mybb",
"vendor": "mybb",
"versions": [
{
"lessThan": "1.8.38",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-23336",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-01T13:48:54.371730Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-06T14:06:34.074Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T22:59:32.176Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/mybb/mybb/security/advisories/GHSA-qfrj-65mv-h75h",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/mybb/mybb/security/advisories/GHSA-qfrj-65mv-h75h"
},
{
"name": "https://github.com/mybb/mybb/commit/d6a96019025de9149014e06b1df252e6122e5630",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/mybb/mybb/commit/d6a96019025de9149014e06b1df252e6122e5630"
},
{
"name": "https://docs.mybb.com/1.8/administration/configuration-file",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://docs.mybb.com/1.8/administration/configuration-file"
},
{
"name": "https://mybb.com/versions/1.8.38",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://mybb.com/versions/1.8.38"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "mybb",
"vendor": "mybb",
"versions": [
{
"status": "affected",
"version": "\u003c 1.8.38"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "MyBB is a free and open source forum software. The default list of disallowed remote hosts does not contain the `127.0.0.0/8` block, which may result in a Server-Side Request Forgery (SSRF) vulnerability. The Configuration File\u0027s _Disallowed Remote Addresses_ list (`$config[\u0027disallowed_remote_addresses\u0027]`) contains the address `127.0.0.1`, but does not include the complete block `127.0.0.0/8`. MyBB 1.8.38 resolves this issue in default installations. Administrators of installed boards should update the existing configuration (`inc/config.php`) to include all addresses blocked by default. Additionally, users are advised to verify that it includes any other IPv4 addresses resolving to the server and other internal resources. Users unable to upgrade may manually add 127.0.0.0/8\u0027 to their disallowed address list."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-918",
"description": "CWE-918: Server-Side Request Forgery (SSRF)",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-184",
"description": "CWE-184: Incomplete List of Disallowed Inputs",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-01T06:27:37.987Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/mybb/mybb/security/advisories/GHSA-qfrj-65mv-h75h",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/mybb/mybb/security/advisories/GHSA-qfrj-65mv-h75h"
},
{
"name": "https://github.com/mybb/mybb/commit/d6a96019025de9149014e06b1df252e6122e5630",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/mybb/mybb/commit/d6a96019025de9149014e06b1df252e6122e5630"
},
{
"name": "https://docs.mybb.com/1.8/administration/configuration-file",
"tags": [
"x_refsource_MISC"
],
"url": "https://docs.mybb.com/1.8/administration/configuration-file"
},
{
"name": "https://mybb.com/versions/1.8.38",
"tags": [
"x_refsource_MISC"
],
"url": "https://mybb.com/versions/1.8.38"
}
],
"source": {
"advisory": "GHSA-qfrj-65mv-h75h",
"discovery": "UNKNOWN"
},
"title": "Incomplete disallowed remote addresses list in MyBB"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2024-23336",
"datePublished": "2024-05-01T06:27:37.987Z",
"dateReserved": "2024-01-15T15:19:19.443Z",
"dateUpdated": "2024-08-01T22:59:32.176Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/mybb/mybb/security/advisories/GHSA-qfrj-65mv-h75h\", \"name\": \"https://github.com/mybb/mybb/security/advisories/GHSA-qfrj-65mv-h75h\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/mybb/mybb/commit/d6a96019025de9149014e06b1df252e6122e5630\", \"name\": \"https://github.com/mybb/mybb/commit/d6a96019025de9149014e06b1df252e6122e5630\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://docs.mybb.com/1.8/administration/configuration-file\", \"name\": \"https://docs.mybb.com/1.8/administration/configuration-file\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://mybb.com/versions/1.8.38\", \"name\": \"https://mybb.com/versions/1.8.38\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T22:59:32.176Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-23336\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-05-01T13:48:54.371730Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*\"], \"vendor\": \"mybb\", \"product\": \"mybb\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.8.38\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-01T13:50:49.060Z\"}}], \"cna\": {\"title\": \"Incomplete disallowed remote addresses list in MyBB\", \"source\": {\"advisory\": \"GHSA-qfrj-65mv-h75h\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"mybb\", \"product\": \"mybb\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 1.8.38\"}]}], \"references\": [{\"url\": \"https://github.com/mybb/mybb/security/advisories/GHSA-qfrj-65mv-h75h\", \"name\": \"https://github.com/mybb/mybb/security/advisories/GHSA-qfrj-65mv-h75h\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/mybb/mybb/commit/d6a96019025de9149014e06b1df252e6122e5630\", \"name\": \"https://github.com/mybb/mybb/commit/d6a96019025de9149014e06b1df252e6122e5630\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://docs.mybb.com/1.8/administration/configuration-file\", \"name\": \"https://docs.mybb.com/1.8/administration/configuration-file\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://mybb.com/versions/1.8.38\", \"name\": \"https://mybb.com/versions/1.8.38\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"MyBB is a free and open source forum software. The default list of disallowed remote hosts does not contain the `127.0.0.0/8` block, which may result in a Server-Side Request Forgery (SSRF) vulnerability. The Configuration File\u0027s _Disallowed Remote Addresses_ list (`$config[\u0027disallowed_remote_addresses\u0027]`) contains the address `127.0.0.1`, but does not include the complete block `127.0.0.0/8`. MyBB 1.8.38 resolves this issue in default installations. Administrators of installed boards should update the existing configuration (`inc/config.php`) to include all addresses blocked by default. Additionally, users are advised to verify that it includes any other IPv4 addresses resolving to the server and other internal resources. Users unable to upgrade may manually add 127.0.0.0/8\u0027 to their disallowed address list.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-918\", \"description\": \"CWE-918: Server-Side Request Forgery (SSRF)\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-184\", \"description\": \"CWE-184: Incomplete List of Disallowed Inputs\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-05-01T06:27:37.987Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-23336\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T22:59:32.176Z\", \"dateReserved\": \"2024-01-15T15:19:19.443Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-05-01T06:27:37.987Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…