CVE-2021-34820
📋 TL;DR
CVE-2021-34820 is a directory traversal vulnerability in the Novus HTTP Server that allows unauthenticated attackers to access arbitrary files on the server via specially crafted HTTP GET requests. This affects Novus Management System (NMS) software up to version 1.51.2, potentially exposing sensitive configuration files, credentials, and other system data.
💻 Affected Systems
- Novus Management System (NMS)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through access to sensitive files like configuration files containing credentials, leading to lateral movement and full control of affected systems.
Likely Case
Exfiltration of sensitive configuration data, credentials, and system files that could enable further attacks or data breaches.
If Mitigated
Limited impact with proper network segmentation, file system permissions, and monitoring in place to detect traversal attempts.
🎯 Exploit Status
Exploitation requires only HTTP GET requests with directory traversal sequences. Public exploit code and technical details are available in the referenced disclosures.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 1.51.2
Vendor Advisory: Not provided in references
Restart Required: Yes
Instructions:
1. Identify affected NMS installations. 2. Upgrade to version after 1.51.2. 3. Restart the Novus HTTP Server service. 4. Verify the fix by testing for directory traversal.
🔧 Temporary Workarounds
Network Access Control
linuxRestrict access to the Novus HTTP Server to only trusted networks and IP addresses.
Use firewall rules to limit access: iptables -A INPUT -p tcp --dport [NMS_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [NMS_PORT] -j DROP
Web Application Firewall
allDeploy a WAF to block directory traversal patterns in HTTP requests.
Configure WAF rules to detect and block sequences like '../', '..\', and encoded variants.
🧯 If You Can't Patch
- Implement strict file system permissions to limit what files the HTTP server process can access.
- Deploy network segmentation to isolate NMS systems from sensitive networks and monitor for traversal attempts.
🔍 How to Verify
Check if Vulnerable:
Test with HTTP GET requests containing directory traversal sequences (e.g., GET /../../etc/passwd) to the NMS server and check for file access.
Check Version:
Check NMS version via web interface or configuration files; consult vendor documentation for exact location.
Verify Fix Applied:
After patching, repeat the traversal test; successful requests should return error messages or be blocked.
📡 Detection & Monitoring
Log Indicators:
- HTTP logs showing requests with '../' or similar traversal patterns
- Access to unexpected files or directories by the HTTP server process
Network Indicators:
- HTTP GET requests with encoded or plain directory traversal sequences
- Unusual file access patterns from external IPs
SIEM Query:
source="web_logs" AND (uri="*../*" OR uri="*..\\*" OR uri="*%2e%2e%2f*")
🔗 References
- http://packetstormsecurity.com/files/163453/Novus-Management-System-Directory-Traversal-Cross-Site-Scripting.html
- http://seclists.org/fulldisclosure/2021/Jul/20
- http://packetstormsecurity.com/files/163453/Novus-Management-System-Directory-Traversal-Cross-Site-Scripting.html
- http://seclists.org/fulldisclosure/2021/Jul/20