CVE-2024-24578

Relative Path Traversal (CWE-23)

Published: Mar 18, 2024 / Updated: 8mo ago

010
CVSS 10EPSS 0.04%Critical
CVE info copied to clipboard

RaspberryMatic is an open-source operating system for HomeMatic internet-of-things devices. RaspberryMatic / OCCU prior to version 3.75.6.20240316 contains a unauthenticated remote code execution (RCE) vulnerability, caused by multiple issues within the Java based `HMIPServer.jar` component. RaspberryMatric includes a Java based `HMIPServer`, that can be accessed through URLs starting with `/pages/jpages`. The `FirmwareController` class does however not perform any session id checks, thus this feature can be accessed without a valid session. Due to this issue, attackers can gain remote code execution as root user, allowing a full system compromise. Version 3.75.6.20240316 contains a patch.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Timeline

First Article

Feedly found the first article mentioning CVE-2024-24578. See article

Mar 18, 2024 at 8:36 AM / Local infosec.exchange timeline
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Mar 18, 2024 at 8:37 AM
CVE Assignment

NVD published the first details for CVE-2024-24578

Mar 18, 2024 at 3:15 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 7.2%)

Mar 19, 2024 at 2:55 PM
Static CVE Timeline Graph

Affected Systems

Raspberrymatic/raspberrymatic
+null more

Attack Patterns

CAPEC-139: Relative Path Traversal
+null more

News

Update Fri Aug 2 14:35:21 UTC 2024
Update Fri Aug 2 14:35:21 UTC 2024
Update Thu Apr 11 10:04:41 UTC 2024
Update Thu Apr 11 10:04:41 UTC 2024
Update Wed Apr 10 10:08:04 UTC 2024
Update Wed Apr 10 10:08:04 UTC 2024
Update Wed Apr 3 18:03:53 UTC 2024
Update Wed Apr 3 18:03:53 UTC 2024
Vulnerability Summary for the Week of March 18, 2024
High Vulnerabilities Primary Vendor — Product Description Published CVSS Score Source & Patch Info N/A — N/A Directory Traversal vulnerability in Devan-Kerman ARRP v.0.8.1 and before allows a remote attacker to execute arbitrary code via the dumpDirect in RuntimeResourcePackImpl component. 2024-03-19 8.8 CVE-2024-24042 cve@mitre.org cve@mitre.org N/A — N/A danielmiessler fabric through 1.3.0 allows installer/client/gui/static/js/index.js XSS because of innerHTML mishandling, such as in htmlToPlainText. 2024-03-18 7.4 CVE-2024-29154 cve@mitre.org aam — advanced_access_manager Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability in AAM Advanced Access Manager allows Reflected XSS.This issue affects Advanced Access Manager: from n/a through 6.9.20. 2024-03-19 7.1 CVE-2024-29127 audit@patchstack.com abast — scan_visio_edocument_suite_web_viewer A SQL Injection has been found on SCAN_VISIO eDocument Suite Web Viewer of Abast. This vulnerability allows an unauthenticated user to retrieve, update and delete all the information of database. This vulnerability was found on login page via “user” parameter. 2024-03-21 9.8 CVE-2024-29732 cve-coordination@incibe.es acryldata — datahub-helm datahub-helm provides the Kubernetes Helm charts for deploying Datahub and its dependencies on a Kubernetes cluster. Starting in version 0.1.143 and prior to version 0.2.182, due to configuration issues in the helm chart, if there was a successful initial deployment during a limited window of time, personal access tokens were possibly created with a default secret key. Since the secret key is a static, publicly available value, someone could inspect the algorithm used to generate personal access tokens and generate their own for an instance.
See 9 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Changed
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI