CVE-2024-11837

9.8 CRITICAL

📋 TL;DR

This CVE describes an N1QL injection vulnerability in PlexTrac that allows attackers to execute arbitrary N1QL commands against the underlying database. This affects PlexTrac installations from version 1.61.3 through versions before 2.8.1. Attackers could potentially read, modify, or delete sensitive data in the database.

💻 Affected Systems

Products:
  • PlexTrac
Versions: from 1.61.3 before 2.8.1
Operating Systems: All platforms running PlexTrac
Default Config Vulnerable: ⚠️ Yes
Notes: All PlexTrac deployments within the affected version range are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the PlexTrac database including exfiltration of all pentest reports, client data, credentials, and potential remote code execution on the database server.

🟠

Likely Case

Unauthorized access to sensitive pentest data, client information, and potential data manipulation or deletion.

🟢

If Mitigated

Limited data exposure if proper network segmentation and database permissions are configured, but injection still possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

N1QL injection typically requires some level of access to the application interface, but once accessed, exploitation is straightforward for attackers familiar with NoSQL injection techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.8.1 and later

Vendor Advisory: https://docs.plextrac.com/plextrac-documentation/master/security-advisories#release-2.11.0

Restart Required: Yes

Instructions:

1. Backup your PlexTrac data and configuration. 2. Upgrade to PlexTrac version 2.8.1 or later. 3. Restart the PlexTrac service. 4. Verify the upgrade was successful.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation and sanitization for all user inputs that interact with N1QL queries.

Network Segmentation

all

Restrict network access to PlexTrac instances to only authorized users and systems.

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries at the application layer
  • Deploy a web application firewall (WAF) with NoSQL injection detection rules

🔍 How to Verify

Check if Vulnerable:

Check PlexTrac version via admin interface or configuration files. If version is between 1.61.3 and less than 2.8.1, the system is vulnerable.

Check Version:

Check PlexTrac admin dashboard or configuration files for version information

Verify Fix Applied:

Verify PlexTrac version is 2.8.1 or higher and test N1QL query interfaces for proper input validation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual N1QL query patterns
  • Multiple failed query attempts with special characters
  • Database error logs showing malformed queries

Network Indicators:

  • Unusual database query traffic patterns
  • Requests containing N1QL injection payloads

SIEM Query:

source="plextrac" AND ("N1QL" OR "Couchbase") AND ("error" OR "malformed" OR "injection")

🔗 References

📤 Share & Export