CVE-2024-22328

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to perform directory traversal attacks on IBM Maximo Application Suite systems. By sending specially crafted URL requests containing 'dot dot' sequences (/../), attackers can read arbitrary files on the server. Organizations running IBM Maximo Application Suite versions 8.10 and 8.11 are affected.

💻 Affected Systems

Products:
  • IBM Maximo Application Suite
Versions: 8.10, 8.11
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable unless patched or workarounds applied.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through reading sensitive configuration files, credentials, or other critical data, potentially leading to lateral movement and data exfiltration.

🟠

Likely Case

Unauthorized access to sensitive files containing configuration data, credentials, or business information stored on the Maximo server.

🟢

If Mitigated

Limited file access restricted by file permissions and system hardening, with no critical data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Directory traversal attacks are well-understood and easy to automate. The vulnerability requires no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply interim fix or upgrade as specified in IBM advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7147543

Restart Required: Yes

Instructions:

1. Review IBM advisory at https://www.ibm.com/support/pages/node/7147543
2. Apply the recommended interim fix or upgrade to a patched version
3. Restart the Maximo Application Suite services
4. Verify the fix is applied

🔧 Temporary Workarounds

Input Validation Filtering

all

Implement web application firewall rules or input validation to block requests containing directory traversal sequences

Network Segmentation

all

Restrict network access to Maximo Application Suite to only trusted sources

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted IP addresses only
  • Deploy a web application firewall with rules to detect and block directory traversal patterns

🔍 How to Verify

Check if Vulnerable:

Check if running IBM Maximo Application Suite version 8.10 or 8.11. Attempt to access files using directory traversal sequences if authorized for testing.

Check Version:

Check Maximo Application Suite version through administrative interface or configuration files

Verify Fix Applied:

Verify the applied patch version matches IBM's recommendations and test that directory traversal attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '/../' or similar directory traversal patterns
  • Unusual file access patterns from web requests
  • Failed attempts to access restricted files

Network Indicators:

  • HTTP requests with encoded directory traversal sequences (%2e%2e%2f)
  • Multiple failed file access attempts from single source

SIEM Query:

web.url:*%2e%2e%2f* OR web.url:*../* AND destination.app:"Maximo"

🔗 References

📤 Share & Export