Apache Ranger: SSRF in Edit Service page - Add logic to filter requests to localhost
Description
SSRF vulnerability in Edit Service Page of Apache Ranger UI in Apache Ranger Version 2.4.0. Users are recommended to upgrade to version Apache Ranger 2.5.0, which fixes this issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Ranger 2.4.0 Edit Service Page is vulnerable to SSRF, allowing requests to internal resources; fixed in 2.5.0.
Vulnerability
Overview
CVE-2024-45479 is a Server-Side Request Forgery (SSRF) vulnerability located in the Edit Service Page of the Apache Ranger UI, specifically affecting version 2.4.0 [1][2][4]. The root cause is insufficient validation of URLs or service endpoints provided by authenticated administrators, enabling the server to make unauthorized requests [4].
Exploitation and
Attack Surface
An attacker with administrative access to the Ranger UI can submit crafted service configurations that trigger the backend to send HTTP requests to arbitrary destinations [1][4]. Since the attack requires authenticated access to the Edit Service Page, the pre-requisite is possession of valid admin credentials or a session where the attacker can manipulate service definitions [4]. The SSRF can target internal network resources (e.g., localhost or private IP ranges) that are normally inaccessible from outside [4].
Impact
Successful exploitation allows the attacker to probe and interact with internal services behind the firewall, potentially gathering sensitive information from cloud metadata endpoints, internal APIs, or other systems that trust the Ranger server [1][4]. This can lead to further lateral movement within the network.
Mitigation
The vulnerability is fixed in Apache Ranger version 2.5.0 [1][2][4]. Users running 2.4.0 are advised to upgrade immediately. If an upgrade is not possible, restricting administrative access to the UI and implementing network-level controls (such as firewall rules that block outbound requests from the Ranger server to private IP ranges) can reduce risk [4].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.ranger:rangerMaven | < 2.5.0 | 2.5.0 |
Affected products
3- Apache Software Foundation/Apache Rangerv5Range: 2.4.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Rangerghsavendor-advisoryWEB
- github.com/advisories/GHSA-g9gf-g5jq-9h3vghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-45479ghsaADVISORY
- www.openwall.com/lists/oss-security/2025/01/21/4ghsaWEB
News mentions
0No linked articles in our index yet.