CVE-2024-22393

9.1 CRITICAL

📋 TL;DR

This vulnerability allows authenticated users to upload large image files that consume excessive server memory, potentially causing denial of service. It affects Apache Answer installations up to version 1.2.1. Any system running vulnerable versions with file upload functionality enabled is at risk.

💻 Affected Systems

Products:
  • Apache Answer
Versions: through 1.2.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to upload functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server outage due to memory exhaustion, rendering the application unavailable to all users.

🟠

Likely Case

Degraded performance or temporary service disruption affecting user experience.

🟢

If Mitigated

Minimal impact with proper file size limits and memory monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user access but is technically simple.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.5

Vendor Advisory: https://lists.apache.org/thread/f58l6dr4r74hl6o71gn47kmn44vw12cv

Restart Required: Yes

Instructions:

1. Backup your current installation. 2. Download Apache Answer version 1.2.5 or later. 3. Replace the existing installation with the patched version. 4. Restart the application server.

🔧 Temporary Workarounds

Implement file upload restrictions

all

Configure web server or application to limit maximum file upload size

# For Apache: Set LimitRequestBody in httpd.conf
# For Nginx: Set client_max_body_size in nginx.conf

Disable image uploads

all

Temporarily disable image upload functionality until patched

# Modify application configuration to disable file uploads

🧯 If You Can't Patch

  • Implement strict file size limits at web server level
  • Monitor server memory usage and set alerts for abnormal consumption

🔍 How to Verify

Check if Vulnerable:

Check Apache Answer version in admin panel or configuration files

Check Version:

Check application version in admin interface or configuration files

Verify Fix Applied:

Confirm version is 1.2.5 or later and test file upload functionality

📡 Detection & Monitoring

Log Indicators:

  • Multiple large file uploads from single user
  • Memory exhaustion warnings in server logs
  • Failed upload attempts with oversized files

Network Indicators:

  • Large HTTP POST requests to upload endpoints
  • Increased server response times

SIEM Query:

source="apache_logs" AND (uri_path="/upload" OR uri_path="/api/upload") AND bytes_sent>10000000

🔗 References

📤 Share & Export