CVE-2024-11979

9.8 CRITICAL

📋 TL;DR

DreamMaker from Interinfo has an unauthenticated path traversal vulnerability that allows attackers to upload arbitrary files to any directory. This can lead to remote code execution via webshells. All systems running vulnerable versions of DreamMaker are affected.

💻 Affected Systems

Products:
  • DreamMaker
Versions: All versions prior to the fix
Operating Systems: All platforms running DreamMaker
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the file upload functionality without requiring authentication.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through arbitrary code execution, data theft, and lateral movement within the network.

🟠

Likely Case

Attackers deploy webshells to maintain persistent access, exfiltrate data, and use the system as a pivot point for further attacks.

🟢

If Mitigated

Limited impact if file uploads are blocked at network perimeter and strict file validation is implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is straightforward to exploit with basic web attack tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Interinfo advisory for specific version

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-8272-13a13-2.html

Restart Required: Yes

Instructions:

1. Check the Interinfo advisory for patch details
2. Apply the security update provided by Interinfo
3. Restart the DreamMaker service
4. Verify the fix is applied

🔧 Temporary Workarounds

Block file uploads at network perimeter

all

Use WAF or firewall rules to block file upload requests to DreamMaker

Implement strict file validation

all

Configure DreamMaker to only accept specific file types and validate file paths

🧯 If You Can't Patch

  • Isolate DreamMaker instances from the internet and restrict network access
  • Implement strict monitoring for file upload activities and webshell detection

🔍 How to Verify

Check if Vulnerable:

Check if DreamMaker allows unauthenticated file uploads with path traversal in the filename parameter

Check Version:

Check DreamMaker version in administration interface or configuration files

Verify Fix Applied:

Test that file uploads now require proper authentication and path traversal attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload patterns
  • Requests with path traversal sequences (../)
  • Uploads of suspicious file types (.php, .jsp, .asp)

Network Indicators:

  • HTTP POST requests to upload endpoints from unexpected sources
  • Multiple failed upload attempts followed by successful ones

SIEM Query:

source="dreammaker.log" AND (url="*upload*" AND (filename="*../*" OR filename="*.php*" OR filename="*.jsp*"))

🔗 References

📤 Share & Export