CVE-2024-11992

9.1 CRITICAL

📋 TL;DR

This is an absolute path traversal vulnerability in Quick.CMS 6.7 that allows remote attackers to bypass security restrictions and download or delete files outside the configured document root. Attackers can exploit this via the aDirFiles[0] parameter in admin.php. All Quick.CMS 6.7 installations with admin.php accessible are affected.

💻 Affected Systems

Products:
  • Quick.CMS
Versions: 6.7
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin.php to be accessible. Default installations with admin interface exposed are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through sensitive file disclosure (configuration files, passwords, SSH keys) and arbitrary file deletion leading to system unavailability.

🟠

Likely Case

Unauthorized access to sensitive files outside web root, potential credential theft, and selective file deletion disrupting application functionality.

🟢

If Mitigated

Limited impact with proper input validation, file permission restrictions, and web server configuration hardening.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to admin.php page. The vulnerability is straightforward to exploit once authenticated or if admin interface is improperly secured.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.8 or later

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/path-traversal-vulnerability-quickcms

Restart Required: No

Instructions:

1. Download latest Quick.CMS version from official source. 2. Backup current installation. 3. Replace vulnerable files with patched version. 4. Verify admin.php no longer accepts malicious path traversal inputs.

🔧 Temporary Workarounds

Restrict admin.php access

all

Limit access to admin.php page using web server authentication or IP restrictions

# Apache: Add to .htaccess
Order deny,allow
Deny from all
Allow from 192.168.1.0/24
# Nginx: Add to server block
location /admin.php {
    allow 192.168.1.0/24;
    deny all;
}

Implement input validation

all

Add server-side validation to reject path traversal sequences in aDirFiles parameter

# PHP example for admin.php
if (strpos($_GET['aDirFiles[0]'], '..') !== false || strpos($_GET['aDirFiles[0]'], '/') === 0) {
    die('Invalid path');
}

🧯 If You Can't Patch

  • Implement strict file system permissions to limit web server user access to only necessary directories
  • Deploy web application firewall (WAF) with path traversal protection rules

🔍 How to Verify

Check if Vulnerable:

Test if admin.php accepts path traversal sequences like '../../etc/passwd' in aDirFiles[0] parameter

Check Version:

Check Quick.CMS version in admin panel or read version from includes/config.php

Verify Fix Applied:

Attempt path traversal exploitation after patch - should receive error or be blocked

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to admin.php with '..' or '/' in parameters
  • Unusual file access patterns in web server logs
  • Failed file access attempts outside document root

Network Indicators:

  • HTTP requests containing path traversal sequences to admin.php endpoint
  • Unusual file download patterns from admin interface

SIEM Query:

source="web_logs" AND uri="/admin.php" AND (param="*..*" OR param="*../*" OR param="/*")

🔗 References

📤 Share & Export