CVE-2024-12367

8.6 HIGH

📋 TL;DR

This vulnerability allows unauthorized directory indexing in Vegagrup Software Vega Master, potentially exposing sensitive system information to attackers. It affects all Vega Master installations from version 1.12.35 through 20250916. The vendor has not yet provided a fix within the specified timeframe.

💻 Affected Systems

Products:
  • Vegagrup Software Vega Master
Versions: from v.1.12.35 through 20250916
Operating Systems: Not specified - likely cross-platform
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the version range are affected. The vendor has not completed the fixing process.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could enumerate directory structures, discover sensitive files (configuration files, logs, credentials), and potentially access restricted data leading to full system compromise.

🟠

Likely Case

Unauthenticated attackers can browse directory contents, discover file paths, and potentially access sensitive information that should not be publicly accessible.

🟢

If Mitigated

With proper access controls and directory listing disabled, impact is limited to information disclosure about directory structure without file access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Directory indexing vulnerabilities typically require minimal technical skill to exploit using standard web requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-25-0249

Instructions:

No official patch available. Monitor vendor communications for updates.

🔧 Temporary Workarounds

Disable Directory Indexing

all

Configure web server to disable directory listing/indexing

For Apache: Options -Indexes in .htaccess or httpd.conf
For Nginx: autoindex off; in server block

Restrict Access with Authentication

all

Implement authentication for Vega Master interface

🧯 If You Can't Patch

  • Place Vega Master behind reverse proxy with strict access controls
  • Implement network segmentation to isolate Vega Master from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Access Vega Master web interface and attempt to browse directories (e.g., append / to URLs). If directory contents are displayed, system is vulnerable.

Check Version:

Check Vega Master version in web interface or configuration files

Verify Fix Applied:

After applying workarounds, verify directory requests return 403 Forbidden or similar error instead of directory listing.

📡 Detection & Monitoring

Log Indicators:

  • Multiple 200 OK responses to directory paths
  • Unusual access patterns to non-standard URLs

Network Indicators:

  • HTTP requests ending with / or without specific file extensions
  • Unusual volume of requests to directory paths

SIEM Query:

web_access_logs status=200 AND (uri ENDS WITH '/' OR uri CONTAINS 'index of')

🔗 References

📤 Share & Export