CVE-2024-11311

Relative Path Traversal (CWE-23)

Published: Nov 18, 2024 / Updated: 1d ago

010
CVSS 9.8EPSS 0.09%Critical
CVE info copied to clipboard

Summary

The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells.

Impact

This vulnerability has a severe impact on the affected systems. Unauthenticated remote attackers can exploit this flaw to upload arbitrary files to any directory on the target system. This can lead to arbitrary code execution, typically through the upload of malicious webshells. The impact is classified as HIGH for confidentiality, integrity, and availability, indicating that attackers can potentially gain full control over the affected system, steal sensitive data, modify or destroy information, and disrupt normal operations.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

As of the current information provided, there is no mention of an available patch for this vulnerability. The security team should closely monitor for any updates or patches released by TRCore for the DVC component.

Mitigation

While awaiting a patch, consider the following mitigation strategies: 1. Implement strict network access controls to limit exposure of the DVC component. 2. Deploy Web Application Firewalls (WAF) to filter malicious file uploads and path traversal attempts. 3. Implement rigorous input validation and sanitization for file uploads. 4. Use the principle of least privilege for file system permissions. 5. Regularly monitor and audit file systems for unauthorized or suspicious files. 6. If possible, temporarily disable file upload functionality until a patch is available. 7. Keep all systems and software up-to-date with the latest security patches. 8. Implement intrusion detection and prevention systems to monitor for exploitation attempts.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Timeline

CVE Assignment

NVD published the first details for CVE-2024-11311

Nov 18, 2024 at 7:15 AM
CVSS

A CVSS base score of 9.8 has been assigned.

Nov 18, 2024 at 7:20 AM / nvd
First Article

Feedly found the first article mentioning CVE-2024-11311. See article

Nov 18, 2024 at 7:25 AM / VulDB Recent Entries
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Nov 18, 2024 at 7:25 AM
EPSS

EPSS Score was set to: 0.09% (Percentile: 40.3%)

Nov 19, 2024 at 9:42 AM
Static CVE Timeline Graph

Links to Mitre Att&cks

T1574.010: Services File Permissions Weakness
+null more

Attack Patterns

CAPEC-139: Relative Path Traversal
+null more

News

Critical - CVE-2024-11311 - The DVC from TRCore has a Path Traversal...
The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory,...
CVE-2024-11311 - TRCore DVC Path Traversal File Upload RCE November 18, 2024 at 07:15AM https:// ift.tt/eo38KDh # CVE # IOC # CTI # ThreatIntelligence # ThreatIntel # Cybersecurity # Recon
TRCore DVC - Arbitrary File Upload through Path Traversal
Trcore - CRITICAL - CVE-2024-11311 The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells.
CVE-2024-11311 - TRCore DVC Path Traversal File Upload RCE
CVE ID : CVE-2024-11311 Published : Nov. 18, 2024, 7:15 a.m. 45 minutes ago Description : The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells. Severity: 9.8
CVE-2024-11311 | TRCore DVC up to 6.3 path traversal
A vulnerability has been found in TRCore DVC up to 6.3 and classified as very critical . This vulnerability affects unknown code. The manipulation leads to relative path traversal. This vulnerability was named CVE-2024-11311 . The attack can be initiated remotely. There is no exploit available.
See 4 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI