CVE-2024-21855
📋 TL;DR
CVE-2024-21855 is an unauthenticated remote code execution vulnerability in GoCast 1.1.3's HTTP API. Attackers can send specially crafted HTTP requests to execute arbitrary commands without authentication. This affects all systems running the vulnerable GoCast version with HTTP API exposed.
💻 Affected Systems
- GoCast
📦 What is this software?
Gocast by Mayuresh82
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise allowing attackers to execute arbitrary commands, install malware, exfiltrate data, or pivot to other systems.
Likely Case
Remote code execution leading to data theft, ransomware deployment, or botnet recruitment.
If Mitigated
Limited impact if proper network segmentation and access controls prevent external access.
🎯 Exploit Status
Public exploit details available in Talos Intelligence reports. Simple HTTP request triggers the vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Consider workarounds or discontinuing use of GoCast 1.1.3.
🔧 Temporary Workarounds
Network Access Restriction
linuxRestrict network access to GoCast HTTP API using firewall rules.
iptables -A INPUT -p tcp --dport [GOCAST_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [GOCAST_PORT] -j DROP
Disable HTTP API
allDisable the vulnerable HTTP API functionality if not required.
Edit GoCast configuration to disable HTTP API or remove HTTP listener
🧯 If You Can't Patch
- Isolate GoCast systems in a restricted network segment with no internet access.
- Implement strict network monitoring and alerting for suspicious HTTP requests to GoCast API endpoints.
🔍 How to Verify
Check if Vulnerable:
Check if GoCast version is 1.1.3 and HTTP API is accessible. Use: curl -v http://[TARGET]:[PORT]/api/endpoints
Check Version:
Check GoCast configuration files or process output for version information.
Verify Fix Applied:
Verify HTTP API is no longer accessible or restricted to trusted sources only.
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP requests to GoCast API endpoints
- Command execution patterns in system logs
Network Indicators:
- HTTP POST/PUT requests to GoCast API with command injection patterns
- Outbound connections from GoCast system to unknown destinations
SIEM Query:
source="goast.log" AND (http_method="POST" OR http_method="PUT") AND uri="/api/*" AND (content="cmd" OR content="exec" OR content="system")