CVE-2024-11839

7.5 HIGH

📋 TL;DR

This CVE describes a deserialization vulnerability in PlexTrac's Runbooks modules that allows attackers to inject malicious objects and write arbitrary files to the system. It affects PlexTrac installations from version 1.61.3 up to (but not including) 2.8.1. Organizations using vulnerable versions of PlexTrac are at risk of compromise.

💻 Affected Systems

Products:
  • PlexTrac
Versions: from 1.61.3 before 2.8.1
Operating Systems: All platforms running PlexTrac
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with Runbooks modules enabled/accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to data exfiltration, ransomware deployment, or complete control over the PlexTrac instance and potentially underlying infrastructure.

🟠

Likely Case

Arbitrary file writes enabling web shell installation, credential theft, or lateral movement within the network.

🟢

If Mitigated

Limited impact due to network segmentation, strict access controls, and monitoring preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires access to Runbooks functionality; authentication status unclear from available information.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.8.1 or later (2.11.0 recommended)

Vendor Advisory: https://docs.plextrac.com/plextrac-documentation/master/security-advisories#release-2.11.0

Restart Required: Yes

Instructions:

1. Backup PlexTrac data and configuration. 2. Upgrade to PlexTrac version 2.8.1 or later. 3. Restart PlexTrac services. 4. Verify functionality post-upgrade.

🔧 Temporary Workarounds

Disable Runbooks Modules

all

Temporarily disable or restrict access to Runbooks functionality if not essential.

Network Segmentation

all

Restrict network access to PlexTrac instance to authorized users only.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the PlexTrac instance.
  • Enable detailed logging and monitoring for suspicious deserialization attempts or file writes.

🔍 How to Verify

Check if Vulnerable:

Check PlexTrac version via web interface or configuration files; versions 1.61.3 to 2.8.0 are vulnerable.

Check Version:

Check PlexTrac web interface admin panel or configuration files for version number.

Verify Fix Applied:

Confirm version is 2.8.1 or later and test Runbooks functionality for anomalies.

📡 Detection & Monitoring

Log Indicators:

  • Unusual deserialization errors
  • Unexpected file write operations in PlexTrac logs
  • Access to Runbooks modules from suspicious IPs

Network Indicators:

  • HTTP requests to Runbooks endpoints with serialized data payloads
  • Outbound connections from PlexTrac server to unknown destinations

SIEM Query:

source="plextrac" AND (event="deserialization" OR event="file_write")

🔗 References

📤 Share & Export