CVE-2024-11315

Relative Path Traversal (CWE-23)

Published: Nov 18, 2024 / Updated: 1d ago

010
CVSS 9.8EPSS 0.09%Critical
CVE info copied to clipboard

Summary

The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells.

Impact

This vulnerability has a severe impact on the affected systems. Unauthenticated remote attackers can exploit this flaw to upload arbitrary files to any directory on the target system. This can lead to arbitrary code execution, typically through the upload of malicious webshells. The potential consequences include: 1. Complete system compromise 2. Unauthorized access to sensitive data 3. Disruption of services 4. Potential lateral movement within the network 5. Use of the compromised system as a launchpad for further attacks The CVSS v3.1 base score for this vulnerability is 9.8 (Critical), indicating the highest severity level. The attack vector is network-based, requires no user interaction, and can be executed with low attack complexity. The impact on confidentiality, integrity, and availability is high across all three aspects.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

Based on the provided information, there is no explicit mention of an available patch. The security team should immediately check with the vendor (TRCore) for any available security updates or patches for the DVC component. If a patch is not yet available, it's crucial to implement strong mitigations and closely monitor for patch releases.

Mitigation

Given the critical nature of this vulnerability, the following mitigation steps are recommended: 1. Implement strong network segmentation to isolate systems running the affected DVC component. 2. Apply strict access controls to limit network access to the affected systems. 3. Deploy and configure Web Application Firewalls (WAF) to detect and block potential exploit attempts. 4. Implement file upload restrictions and validations at the application level, if possible. 5. Regularly monitor system logs for any suspicious file upload activities or unauthorized access attempts. 6. Consider temporarily disabling the file upload functionality if it's not business-critical. 7. Conduct a thorough security audit of the affected systems to ensure no compromise has occurred. 8. Prepare an incident response plan in case of successful exploitation. 9. Stay in close contact with the vendor for patch information and apply security updates as soon as they become available. Given the critical CVSS score and the ease of exploitation, addressing this vulnerability should be given the highest priority in the patching and remediation efforts.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Timeline

CVE Assignment

NVD published the first details for CVE-2024-11315

Nov 18, 2024 at 7:15 AM
CVSS

A CVSS base score of 9.8 has been assigned.

Nov 18, 2024 at 7:20 AM / nvd
First Article

Feedly found the first article mentioning CVE-2024-11315. See article

Nov 18, 2024 at 7:27 AM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Nov 18, 2024 at 7:27 AM
EPSS

EPSS Score was set to: 0.09% (Percentile: 40.3%)

Nov 19, 2024 at 9:42 AM
Static CVE Timeline Graph

Links to Mitre Att&cks

T1574.010: Services File Permissions Weakness
+null more

Attack Patterns

CAPEC-139: Relative Path Traversal
+null more

News

Critical - CVE-2024-11315 - The DVC from TRCore has a Path Traversal...
The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory,...
CVE-2024-11315 | TRCore DVC up to 6.3 path traversal
A vulnerability classified as very critical has been found in TRCore DVC up to 6.3 . This affects an unknown part. The manipulation leads to relative path traversal. This vulnerability is uniquely identified as CVE-2024-11315 . It is possible to initiate the attack remotely. There is no exploit available.
CVE-2024-11315 - TRCore DVC Path Traversal Code Execution November 18, 2024 at 07:15AM https:// ift.tt/ALCpYzb # CVE # IOC # CTI # ThreatIntelligence # ThreatIntel # Cybersecurity # Recon
TRCore DVC - Arbitrary File Upload through Path Traversal
Trcore - CRITICAL - CVE-2024-11315 The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells.
CVE-2024-11315 - TRCore DVC Path Traversal Code Execution
CVE ID : CVE-2024-11315 Published : Nov. 18, 2024, 7:15 a.m. 45 minutes ago Description : The DVC from TRCore has a Path Traversal vulnerability and does not restrict the types of uploaded files. This allows unauthenticated remote attackers to upload arbitrary files to any directory, leading to arbitrary code execution by uploading webshells. Severity: 9.8
See 3 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI