Impact
This vulnerability is due to a flaw in the IP validation function checkIpByMask(). The function incorrectly rejects any IP containing a slash, causing the function to return false for plain IP addresses. As a result, private address ranges 10.0.0.0/8 and 172.16.0.0/12 bypass SSRF protection. An attacker can send requests that reach internal services via the application, potentially gaining access to internal resources or performing reconnaissance, impacting confidentiality and integrity of internal assets.
Affected Systems
This issue affects the FreeScout help desk application built on PHP's Laravel framework. All releases prior to 1.8.211 are vulnerable. The affected product is freescout-help-desk:freescout. Users running any version earlier than 1.8.211 are exposed to the SSRF bypass.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity, but the low EPSS of <1% suggests that exploitation is currently uncommon. The vulnerability is not listed in CISA KEV. Exploitation requires the attacker to be able to trigger the SSRF mechanism within the application, then supply a plain IP address that falls within a private network range; the buggy check allows such addresses to bypass the intended filter.
OpenCVE Enrichment