Exploit
CVE-2024-9006

Improper Control of Generation of Code ('Code Injection') (CWE-94)

Published: Sep 19, 2024 / Updated: 2mo ago

010
CVSS 5.3EPSS 0.04%Medium
CVE info copied to clipboard

Summary

A critical vulnerability has been discovered in jeanmarc77 123solar version 1.8.4.5. The issue affects an unknown functionality in the file config/config_invt1.php. This vulnerability allows for code injection through the manipulation of the PASSOx argument. The attack can be launched remotely and requires low attack complexity with low privileges. No user interaction is needed for exploitation.

Impact

This vulnerability has been rated as critical with a CVSS v3.1 base score of 8.8, indicating high severity. The impact is significant across all three main security objectives: 1. Confidentiality: High impact, potentially allowing unauthorized access to sensitive information. 2. Integrity: High impact, possibly enabling attackers to modify or tamper with system data. 3. Availability: High impact, which could result in system disruptions or denial of service. The vulnerability can be exploited remotely over the network, making it particularly dangerous. Given that the exploit has been publicly disclosed, there is an increased risk of active exploitation in the wild.

Exploitation

Multiple proof-of-concept exploits are available on github.com, github.com. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available and has been identified with the commit hash f4a8c748ec436e5a79f91ccb6a6f73752b336aa5. It is strongly recommended to apply this patch immediately to address the vulnerability.

Mitigation

1. Apply the available patch (commit f4a8c748ec436e5a79f91ccb6a6f73752b336aa5) immediately to all instances of 123solar version 1.8.4.5. 2. If immediate patching is not possible, consider temporarily disabling or restricting access to the affected component (config/config_invt1.php) until the patch can be applied. 3. Implement network segmentation and access controls to limit potential attack vectors. 4. Monitor systems for any suspicious activities, particularly those involving the PASSOx argument in requests to the affected file. 5. Regularly review and update security measures, including timely application of security patches for all software components.

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Timeline

First Article

Feedly found the first article mentioning CVE-2024-9006. See article

Sep 19, 2024 at 10:36 PM / CVE
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Sep 19, 2024 at 10:38 PM
CVE Assignment

NVD published the first details for CVE-2024-9006

Sep 19, 2024 at 11:15 PM
CVSS

A CVSS base score of 6.3 has been assigned.

Sep 19, 2024 at 11:20 PM / nvd
EPSS

EPSS Score was set to: 0.04% (Percentile: 10.9%)

Sep 20, 2024 at 10:03 AM
CVSS

A CVSS base score of 8.8 has been assigned.

Sep 25, 2024 at 6:45 PM / nvd
Proof of Concept (PoC) Released

A proof of concept exploit has been released

Sep 25, 2024 at 9:10 PM
CVSS

A CVSS base score of 8.8 has been assigned.

Oct 28, 2024 at 9:36 PM / nvd
Static CVE Timeline Graph

Affected Systems

Jeanmarc77/123solar
+null more

Exploits

https://github.com/jeanmarc77/123solar/issues/74
+null more

Patches

github.com
+null more

Attack Patterns

CAPEC-242: Code Injection
+null more

News

Update Tue Oct 8 14:29:49 UTC 2024
Update Tue Oct 8 14:29:49 UTC 2024
CVE-2024-9006 Exploit
CVE Id : CVE-2024-9006 Published Date: 2024-09-25T18:44:00+00:00 A vulnerability was found in jeanmarc77 123solar 1.8.4.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file config/config_invt1.php. The manipulation of the argument PASSOx leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as f4a8c748ec436e5a79f91ccb6a6f73752b336aa5. It is recommended to apply a patch to fix this issue.
Critical Vulnerability in Jeanmarc77 1.8.4.5 Allows Code Injection
Jeanmarc77 - MEDIUM - CVE-2024-9006 A vulnerability was found in jeanmarc77 123solar 1.8.4.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file config/config_invt1.php. The manipulation of the argument PASSOx leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as f4a8c748ec436e5a79f91ccb6a6f73752b336aa5. It is recommended to apply a patch to fix this issue.
NA - CVE-2024-9006 - A vulnerability was found in jeanmarc77...
A vulnerability was found in jeanmarc77 123solar 1.8.4.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file config/config_invt1.php. The manipulation...
CVE-2024-9006
High Severity Description A vulnerability was found in jeanmarc77 123solar 1.8.4.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file config/config_invt1.php. The manipulation of the argument PASSOx leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The patch is identified as f4a8c748ec436e5a79f91ccb6a6f73752b336aa5. It is recommended to apply a patch to fix this issue. Read more at https://www.tenable.com/cve/CVE-2024-9006
See 8 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:Low
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI