CVE-2021-30497

7.5 HIGH

📋 TL;DR

CVE-2021-30497 is an absolute path traversal vulnerability in Ivanti Avalanche (Premise) that allows unauthenticated remote attackers to read arbitrary files on the server. The vulnerability exists in the /AvalancheWeb/image endpoint where the imageFilePath parameter is not properly validated. Organizations running vulnerable versions of Ivanti Avalanche are affected.

💻 Affected Systems

Products:
  • Ivanti Avalanche (Premise)
Versions: 6.3.2 and potentially earlier versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the web interface component of Avalanche. Systems with the web interface exposed are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files (like SAM databases, configuration files, credentials), potentially leading to full system compromise and lateral movement within the network.

🟠

Likely Case

Attackers exfiltrate sensitive configuration files, system files, or application data, leading to information disclosure and potential credential theft.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the Avalanche server itself rather than the entire network.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit requires simple HTTP requests with path traversal sequences. Public exploit code and technical details are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.3.3 or later

Vendor Advisory: https://forums.ivanti.com/s/article/Security-Alert-CVE-2021-30497-Directory-Traversal-Vulnerability?language=en_US

Restart Required: Yes

Instructions:

1. Download the latest version from Ivanti support portal. 2. Backup current configuration. 3. Install the update following Ivanti's upgrade documentation. 4. Restart the Avalanche services.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict access to the Avalanche web interface to trusted IP addresses only

Use firewall rules to limit access to port 8080/TCP (default Avalanche web port) to authorized management networks

Web Application Firewall

all

Deploy a WAF with path traversal protection rules

Configure WAF to block requests containing '../' sequences or absolute paths in the imageFilePath parameter

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Avalanche server from critical systems
  • Deploy intrusion detection rules to monitor for path traversal attempts to the /AvalancheWeb/image endpoint

🔍 How to Verify

Check if Vulnerable:

Test by sending a GET request to /AvalancheWeb/image?imageFilePath=C:/Windows/system32/config/system.sav and checking if the file content is returned

Check Version:

Check the Avalanche web interface login page or administration console for version information

Verify Fix Applied:

After patching, the same test request should return an error or empty response instead of file content

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /AvalancheWeb/image with path traversal sequences (../, absolute paths)
  • Unusual file access patterns from the Avalanche web service

Network Indicators:

  • HTTP GET requests to /AvalancheWeb/image containing Windows path patterns or ../ sequences

SIEM Query:

source="avalanche_logs" AND uri_path="/AvalancheWeb/image" AND (uri_query CONTAINS "../" OR uri_query CONTAINS "C:/")

🔗 References

📤 Share & Export