CVE-2024-11313

Relative Path Traversal (CWE-23)

Published: Nov 18, 2024 / Updated: 1d ago

010
CVSS 9.8EPSS 0.09%Critical
CVE info copied to clipboard

Summary

The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells.

Impact

This vulnerability has a severe impact on the affected systems. Attackers can exploit it to upload malicious files, including webshells, to any directory on the target system. This can lead to arbitrary code execution, potentially giving the attacker full control over the compromised system. The attacker can perform various malicious activities, such as data theft, system modification, or using the compromised system as a pivot point for further attacks within the network. Given that the vulnerability allows unauthenticated remote access, the potential for widespread exploitation is high.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

Based on the provided information, there is no mention of an available patch for this vulnerability. The security team should monitor for updates from TRCore regarding a patch for the DVC component.

Mitigation

Until a patch is available, the following mitigation steps are recommended: 1. Implement network segmentation to limit access to the affected DVC component. 2. Use a Web Application Firewall (WAF) to filter and block malicious file upload attempts. 3. Implement strict file type and size restrictions on any file upload functionality. 4. Regularly monitor and audit file systems for any suspicious or unexpected files. 5. Implement and maintain robust logging and monitoring systems to detect potential exploitation attempts. 6. Consider temporarily disabling the file upload functionality if it's not critical for operations. 7. Ensure all systems are up-to-date with the latest security patches for other components to minimize overall risk.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Timeline

CVE Assignment

NVD published the first details for CVE-2024-11313

Nov 18, 2024 at 7:15 AM
CVSS

A CVSS base score of 9.8 has been assigned.

Nov 18, 2024 at 7:20 AM / nvd
First Article

Feedly found the first article mentioning CVE-2024-11313. See article

Nov 18, 2024 at 7:27 AM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Nov 18, 2024 at 7:27 AM
EPSS

EPSS Score was set to: 0.09% (Percentile: 40.3%)

Nov 19, 2024 at 9:42 AM
Static CVE Timeline Graph

Links to Mitre Att&cks

T1574.010: Services File Permissions Weakness
+null more

Attack Patterns

CAPEC-139: Relative Path Traversal
+null more

News

Critical - CVE-2024-11313 - The DVC from TRCore has a Path Traversal...
The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory,...
CVE-2024-11313 | TRCore DVC up to 6.3 path traversal
A vulnerability, which was classified as very critical , has been found in TRCore DVC up to 6.3 . This issue affects some unknown processing. The manipulation leads to relative path traversal. The identification of this vulnerability is CVE-2024-11313 . The attack may be initiated remotely. There is no exploit available.
CVE-2024-11313 - TRCore DVC Path Traversal RCE November 18, 2024 at 07:15AM https:// ift.tt/04bjc2t # CVE # IOC # CTI # ThreatIntelligence # ThreatIntel # Cybersecurity # Recon
TRCore DVC - Arbitrary File Upload through Path Traversal
Trcore - CRITICAL - CVE-2024-11313 The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells.
CVE-2024-11313 - TRCore DVC Path Traversal RCE
CVE ID : CVE-2024-11313 Published : Nov. 18, 2024, 7:15 a.m. 45 minutes ago Description : The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells. Severity: 9.8
See 3 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI