CVE-2024-13212
📋 TL;DR
This critical vulnerability in SingMR HouseRent 1.0 allows remote attackers to upload arbitrary files without restrictions via the singleUpload/upload function. Attackers can exploit this to upload malicious files like webshells or malware. All users running HouseRent 1.0 are affected.
💻 Affected Systems
- SingMR HouseRent
📦 What is this software?
Houserent by Singmr
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise via webshell upload leading to remote code execution, data theft, and lateral movement within the network.
Likely Case
Attackers upload webshells to gain persistent access, deface websites, or deploy ransomware on the server.
If Mitigated
File uploads are blocked or properly validated, preventing malicious file execution.
🎯 Exploit Status
Exploit details are publicly disclosed in GitHub issues. Attack requires sending specially crafted file upload requests.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch exists. Consider applying workarounds or replacing the software.
🔧 Temporary Workarounds
Implement File Upload Validation
allAdd server-side validation to restrict file types, check file signatures, and limit upload sizes.
Modify src/main/java/com/house/wym/controller/AddHouseController.java to add validation logic
Web Application Firewall Rules
allConfigure WAF to block malicious file upload patterns and suspicious upload requests.
Add WAF rules to detect and block unrestricted upload attempts
🧯 If You Can't Patch
- Disable the vulnerable upload functionality entirely if not required
- Implement network segmentation to isolate the HouseRent application from critical systems
🔍 How to Verify
Check if Vulnerable:
Test if you can upload files with dangerous extensions (.jsp, .php, .exe) via the upload endpoint without validation.
Check Version:
Check application version in configuration files or via version endpoint if available.
Verify Fix Applied:
Attempt to upload restricted file types; successful uploads should be blocked with proper error messages.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads with suspicious extensions
- Multiple failed upload attempts
- Uploads of unusually large files
Network Indicators:
- HTTP POST requests to upload endpoints with malicious file content
- Traffic patterns showing file uploads to unexpected paths
SIEM Query:
source="web_logs" AND (uri="/upload" OR uri="/singleUpload") AND (file_extension IN ("jsp", "php", "exe", "war"))