CVE-2024-13133
📋 TL;DR
This critical vulnerability in ZeroWdd studentmanager 1.0 allows attackers to upload arbitrary files without restrictions through the addStudent/editStudent functions. Remote attackers can exploit this to potentially execute malicious code or compromise the system. All deployments of studentmanager 1.0 are affected.
💻 Affected Systems
- ZeroWdd studentmanager
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, or ransomware deployment
Likely Case
Webshell upload enabling persistent access, data exfiltration, or lateral movement
If Mitigated
File upload attempts blocked or quarantined with no successful exploitation
🎯 Exploit Status
Exploit details are publicly disclosed in GitHub issues, making exploitation straightforward
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch available. Consider workarounds or migrating to alternative software.
🔧 Temporary Workarounds
File Upload Restriction
allImplement strict file type validation and size limits on upload endpoints
Web Application Firewall Rules
allDeploy WAF rules to block malicious file upload patterns
🧯 If You Can't Patch
- Isolate the studentmanager application in a restricted network segment
- Implement strict file system permissions and disable execution in upload directories
🔍 How to Verify
Check if Vulnerable:
Check if running studentmanager 1.0 and test file upload functionality with malicious extensions
Check Version:
Check application version in configuration files or about page
Verify Fix Applied:
Test that file uploads with dangerous extensions (like .jsp, .php, .exe) are rejected
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads, especially with executable extensions
- Large file uploads to student endpoints
Network Indicators:
- POST requests to /addStudent or /editStudent with file uploads
SIEM Query:
source="web_logs" AND (uri="/addStudent" OR uri="/editStudent") AND method="POST" AND file_upload="true"