CVE-2024-9985

Unrestricted Upload of File with Dangerous Type (CWE-434)

Published: Oct 15, 2024 / Updated: 35d ago

010
CVSS 9.8EPSS 0.09%Critical
CVE info copied to clipboard

Summary

Enterprise Cloud Database from Ragic does not properly validate the file type for uploads. Attackers with regular privileges can upload a webshell and use it to execute arbitrary code on the remote server.

Impact

This vulnerability allows attackers to execute arbitrary code on the remote server, potentially leading to complete system compromise. The attacker can gain unauthorized access to sensitive data, modify or delete information, and potentially use the compromised server as a launching point for further attacks within the network. Given the high impact on confidentiality, integrity, and availability, this vulnerability poses a severe risk to the affected systems.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. The vulnerability affects Enterprise Cloud Database versions prior to the update released on 2024-08-08.

Mitigation

1. Update Enterprise Cloud Database from Ragic to the version released on or after 2024-08-08. 2. Implement strict file type validation for all file uploads. 3. Use a web application firewall (WAF) to filter potentially malicious file uploads. 4. Implement least privilege principles to limit the potential impact of successful attacks. 5. Regularly monitor and audit file upload activities for any suspicious behavior.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Timeline

CVE Assignment

NVD published the first details for CVE-2024-9985

Oct 15, 2024 at 9:15 AM
First Article

Feedly found the first article mentioning CVE-2024-9985. See article

Oct 15, 2024 at 9:24 AM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Oct 15, 2024 at 9:24 AM
EPSS

EPSS Score was set to: 0.09% (Percentile: 39.8%)

Oct 16, 2024 at 9:58 AM
CVSS

A CVSS base score of 9.8 has been assigned.

Oct 16, 2024 at 10:05 PM / nvd
Static CVE Timeline Graph

Affected Systems

Ragic/enterprise_cloud_database
+null more

Links to Mitre Att&cks

T1574.010: Services File Permissions Weakness
+null more

Attack Patterns

CAPEC-1: Accessing Functionality Not Properly Constrained by ACLs
+null more

News

【Vulnerability Alert】 Multiple Critical Security Vulnerabilities in Ragic Enterprise Cloud Database
Source: Ministry of education information & communication security contingency platform Ministry of education information & communication security contingency platform
Ragic Enterprise Cloud Database Patches Multi Flaws, Including CVE-2024-9984 (CVSS 9.8) [app] [cloud]
TWCERT/CC warns of vulnerabilities in Ragic Enterprise Cloud Database (CVE-2024-9983, CVE-2024-9984, CVE-2024-9985) allowing data breaches, system compromise, and operational disruptions, urging update to version 2024/08/08 09:45:25 or later.
Ragic Enterprise Cloud Database Patches Multi Flaws, Including CVE-2024-9984 (CVSS 9.8)
Taiwan’s Computer Emergency Response Team (TWCERT/CC) has issued a warning regarding multiple vulnerabilities discovered in the Ragic Enterprise Cloud Database, a popular no-code platform for building custom business applications. CVE-2024-9983 (CVSS 7.5): Arbitrary File Read via Path Traversal: This flaw allows unauthenticated attackers to exploit a vulnerability in a specific page parameter to read arbitrary system files, potentially exposing sensitive information.
Critical - CVE-2024-9985 - Enterprise Cloud Database from Ragic does not...
Enterprise Cloud Database from Ragic does not properly validate the file type for uploads. Attackers with regular privileges can upload a webshell and use it to execute arbitrary code on the remote...
CVE-2024-9985
Enterprise Cloud Database from Ragic does not properly validate the file type for uploads. Attackers with regular privileges can upload a webshell and use it to execute arbitrary code on the remote...
See 6 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI