CVE-2024-41668 (GCVE-0-2024-41668)
Vulnerability from cvelistv5 – Published: 2024-07-23 18:14 – Updated: 2024-08-02 04:46
VLAI?
Title
cBioPortal Proxy Endpoint Vulnerabliity
Summary
The cBioPortal for Cancer Genomics provides visualization, analysis, and download of large-scale cancer genomics data sets. When running a publicly exposed proxy endpoint without authentication, cBioPortal could allow someone to perform a Server Side Request Forgery (SSRF) attack. Logged in users could do the same on private instances. A fix has been released in version 6.0.12. As a workaround, one might be able to disable `/proxy` endpoint entirely via, for example, nginx.
Severity ?
8.3 (High)
CWE
- CWE-918 - Server-Side Request Forgery (SSRF)
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| cBioPortal | cbioportal |
Affected:
< 6.0.12
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:cbioportal_project:cbioportal:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "cbioportal",
"vendor": "cbioportal_project",
"versions": [
{
"lessThan": "6.0.12",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-41668",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-25T14:45:01.853051Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-25T14:47:53.439Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T04:46:52.924Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/cBioPortal/cbioportal/security/advisories/GHSA-9h44-r3c3-q7rm",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/cBioPortal/cbioportal/security/advisories/GHSA-9h44-r3c3-q7rm"
},
{
"name": "https://github.com/cBioPortal/cbioportal/pull/10884",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/cBioPortal/cbioportal/pull/10884"
},
{
"name": "https://github.com/cBioPortal/cbioportal/commit/ea8642fdbda2d61d2ab34b9da7a1594680bbbcd5",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/cBioPortal/cbioportal/commit/ea8642fdbda2d61d2ab34b9da7a1594680bbbcd5"
},
{
"name": "https://github.com/cBioPortal/cbioportal/releases/tag/v6.0.12",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/cBioPortal/cbioportal/releases/tag/v6.0.12"
},
{
"name": "https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-004",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-004"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "cbioportal",
"vendor": "cBioPortal",
"versions": [
{
"status": "affected",
"version": "\u003c 6.0.12"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The cBioPortal for Cancer Genomics provides visualization, analysis, and download of large-scale cancer genomics data sets. When running a publicly exposed proxy endpoint without authentication, cBioPortal could allow someone to perform a Server Side Request Forgery (SSRF) attack. Logged in users could do the same on private instances. A fix has been released in version 6.0.12. As a workaround, one might be able to disable `/proxy` endpoint entirely via, for example, nginx."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-918",
"description": "CWE-918: Server-Side Request Forgery (SSRF)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-23T18:14:41.169Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/cBioPortal/cbioportal/security/advisories/GHSA-9h44-r3c3-q7rm",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/cBioPortal/cbioportal/security/advisories/GHSA-9h44-r3c3-q7rm"
},
{
"name": "https://github.com/cBioPortal/cbioportal/pull/10884",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/cBioPortal/cbioportal/pull/10884"
},
{
"name": "https://github.com/cBioPortal/cbioportal/commit/ea8642fdbda2d61d2ab34b9da7a1594680bbbcd5",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/cBioPortal/cbioportal/commit/ea8642fdbda2d61d2ab34b9da7a1594680bbbcd5"
},
{
"name": "https://github.com/cBioPortal/cbioportal/releases/tag/v6.0.12",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/cBioPortal/cbioportal/releases/tag/v6.0.12"
},
{
"name": "https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-004",
"tags": [
"x_refsource_MISC"
],
"url": "https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-004"
}
],
"source": {
"advisory": "GHSA-9h44-r3c3-q7rm",
"discovery": "UNKNOWN"
},
"title": "cBioPortal Proxy Endpoint Vulnerabliity"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2024-41668",
"datePublished": "2024-07-23T18:14:41.169Z",
"dateReserved": "2024-07-18T15:21:47.485Z",
"dateUpdated": "2024-08-02T04:46:52.924Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2024-41668",
"date": "2026-04-27",
"epss": "0.00112",
"percentile": "0.2946"
},
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"The cBioPortal for Cancer Genomics provides visualization, analysis, and download of large-scale cancer genomics data sets. When running a publicly exposed proxy endpoint without authentication, cBioPortal could allow someone to perform a Server Side Request Forgery (SSRF) attack. Logged in users could do the same on private instances. A fix has been released in version 6.0.12. As a workaround, one might be able to disable `/proxy` endpoint entirely via, for example, nginx.\"}, {\"lang\": \"es\", \"value\": \"El cBioPortal for Cancer Genomics proporciona visualizaci\\u00f3n, an\\u00e1lisis y descarga de conjuntos de datos de gen\\u00f3mica del c\\u00e1ncer a gran escala. Al ejecutar un endpoint proxy expuesto p\\u00fablicamente sin autenticaci\\u00f3n, cBioPortal podr\\u00eda permitir que alguien realice un ataque de Server Side Request Forgery (SSRF). Los usuarios que hayan iniciado sesi\\u00f3n podr\\u00edan hacer lo mismo en instancias privadas. Se ha publicado una soluci\\u00f3n en la versi\\u00f3n 6.0.12. Como workaround, se podr\\u00eda deshabilitar completamente el endpoint `/proxy` mediante, por ejemplo, nginx.\"}]",
"id": "CVE-2024-41668",
"lastModified": "2024-11-21T09:32:56.450",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L\", \"baseScore\": 8.3, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.7}]}",
"published": "2024-07-23T19:15:13.437",
"references": "[{\"url\": \"https://github.com/cBioPortal/cbioportal/commit/ea8642fdbda2d61d2ab34b9da7a1594680bbbcd5\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/cBioPortal/cbioportal/pull/10884\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/cBioPortal/cbioportal/releases/tag/v6.0.12\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/cBioPortal/cbioportal/security/advisories/GHSA-9h44-r3c3-q7rm\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-004\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/cBioPortal/cbioportal/commit/ea8642fdbda2d61d2ab34b9da7a1594680bbbcd5\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/cBioPortal/cbioportal/pull/10884\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/cBioPortal/cbioportal/releases/tag/v6.0.12\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/cBioPortal/cbioportal/security/advisories/GHSA-9h44-r3c3-q7rm\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-004\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-918\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-41668\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-07-23T19:15:13.437\",\"lastModified\":\"2024-11-21T09:32:56.450\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The cBioPortal for Cancer Genomics provides visualization, analysis, and download of large-scale cancer genomics data sets. When running a publicly exposed proxy endpoint without authentication, cBioPortal could allow someone to perform a Server Side Request Forgery (SSRF) attack. Logged in users could do the same on private instances. A fix has been released in version 6.0.12. As a workaround, one might be able to disable `/proxy` endpoint entirely via, for example, nginx.\"},{\"lang\":\"es\",\"value\":\"El cBioPortal for Cancer Genomics proporciona visualizaci\u00f3n, an\u00e1lisis y descarga de conjuntos de datos de gen\u00f3mica del c\u00e1ncer a gran escala. Al ejecutar un endpoint proxy expuesto p\u00fablicamente sin autenticaci\u00f3n, cBioPortal podr\u00eda permitir que alguien realice un ataque de Server Side Request Forgery (SSRF). Los usuarios que hayan iniciado sesi\u00f3n podr\u00edan hacer lo mismo en instancias privadas. Se ha publicado una soluci\u00f3n en la versi\u00f3n 6.0.12. Como workaround, se podr\u00eda deshabilitar completamente el endpoint `/proxy` mediante, por ejemplo, nginx.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L\",\"baseScore\":8.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":3.7}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-918\"}]}],\"references\":[{\"url\":\"https://github.com/cBioPortal/cbioportal/commit/ea8642fdbda2d61d2ab34b9da7a1594680bbbcd5\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/cBioPortal/cbioportal/pull/10884\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/cBioPortal/cbioportal/releases/tag/v6.0.12\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/cBioPortal/cbioportal/security/advisories/GHSA-9h44-r3c3-q7rm\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-004\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/cBioPortal/cbioportal/commit/ea8642fdbda2d61d2ab34b9da7a1594680bbbcd5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/cBioPortal/cbioportal/pull/10884\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/cBioPortal/cbioportal/releases/tag/v6.0.12\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/cBioPortal/cbioportal/security/advisories/GHSA-9h44-r3c3-q7rm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-004\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/cBioPortal/cbioportal/security/advisories/GHSA-9h44-r3c3-q7rm\", \"name\": \"https://github.com/cBioPortal/cbioportal/security/advisories/GHSA-9h44-r3c3-q7rm\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/cBioPortal/cbioportal/pull/10884\", \"name\": \"https://github.com/cBioPortal/cbioportal/pull/10884\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/cBioPortal/cbioportal/commit/ea8642fdbda2d61d2ab34b9da7a1594680bbbcd5\", \"name\": \"https://github.com/cBioPortal/cbioportal/commit/ea8642fdbda2d61d2ab34b9da7a1594680bbbcd5\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/cBioPortal/cbioportal/releases/tag/v6.0.12\", \"name\": \"https://github.com/cBioPortal/cbioportal/releases/tag/v6.0.12\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-004\", \"name\": \"https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-004\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T04:46:52.924Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-41668\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-25T14:45:01.853051Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:cbioportal_project:cbioportal:*:*:*:*:*:*:*:*\"], \"vendor\": \"cbioportal_project\", \"product\": \"cbioportal\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"6.0.12\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-25T14:47:46.416Z\"}}], \"cna\": {\"title\": \"cBioPortal Proxy Endpoint Vulnerabliity\", \"source\": {\"advisory\": \"GHSA-9h44-r3c3-q7rm\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 8.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"cBioPortal\", \"product\": \"cbioportal\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 6.0.12\"}]}], \"references\": [{\"url\": \"https://github.com/cBioPortal/cbioportal/security/advisories/GHSA-9h44-r3c3-q7rm\", \"name\": \"https://github.com/cBioPortal/cbioportal/security/advisories/GHSA-9h44-r3c3-q7rm\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/cBioPortal/cbioportal/pull/10884\", \"name\": \"https://github.com/cBioPortal/cbioportal/pull/10884\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/cBioPortal/cbioportal/commit/ea8642fdbda2d61d2ab34b9da7a1594680bbbcd5\", \"name\": \"https://github.com/cBioPortal/cbioportal/commit/ea8642fdbda2d61d2ab34b9da7a1594680bbbcd5\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/cBioPortal/cbioportal/releases/tag/v6.0.12\", \"name\": \"https://github.com/cBioPortal/cbioportal/releases/tag/v6.0.12\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-004\", \"name\": \"https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2024-004\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The cBioPortal for Cancer Genomics provides visualization, analysis, and download of large-scale cancer genomics data sets. When running a publicly exposed proxy endpoint without authentication, cBioPortal could allow someone to perform a Server Side Request Forgery (SSRF) attack. Logged in users could do the same on private instances. A fix has been released in version 6.0.12. As a workaround, one might be able to disable `/proxy` endpoint entirely via, for example, nginx.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-918\", \"description\": \"CWE-918: Server-Side Request Forgery (SSRF)\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-07-23T18:14:41.169Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-41668\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-02T04:46:52.924Z\", \"dateReserved\": \"2024-07-18T15:21:47.485Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-07-23T18:14:41.169Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…