CVE-2024-22851

7.5 HIGH

📋 TL;DR

A directory traversal vulnerability in LiveConfig before version 2.5.2 allows remote attackers to access sensitive files outside the intended directory via crafted requests to the /static/ endpoint. This affects all LiveConfig installations running vulnerable versions, potentially exposing configuration files, credentials, or other sensitive data.

💻 Affected Systems

Products:
  • LiveConfig
Versions: All versions before 2.5.2
Operating Systems: Linux, Windows, All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of LiveConfig before 2.5.2 are vulnerable. The vulnerability exists in the static file serving component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through exposure of sensitive configuration files containing credentials, leading to unauthorized access, data theft, or further exploitation.

🟠

Likely Case

Exposure of sensitive configuration files, potentially revealing database credentials, API keys, or other secrets that could enable lateral movement or data exfiltration.

🟢

If Mitigated

Limited information disclosure with no critical credentials exposed due to proper file permissions and security controls.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable remotely via HTTP requests without authentication, making internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable but have reduced attack surface compared to internet-facing deployments.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP requests with directory traversal sequences. Public proof-of-concept code is available in advisory references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.5.2

Vendor Advisory: https://www.liveconfig.com/de/kb/cve/cve-2024-22851/

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download LiveConfig 2.5.2 or later from official sources. 3. Follow upgrade instructions for your platform. 4. Restart LiveConfig service.

🔧 Temporary Workarounds

Web Server Access Restriction

all

Configure web server (Apache/Nginx) to block directory traversal attempts to /static/ endpoint

# Apache: RewriteRule ^/static/.*\.\./.* - [F,L]
# Nginx: location ~ ^/static/.*\.\./.* { return 403; }

Network Access Control

linux

Restrict access to LiveConfig web interface to trusted networks only

# Firewall rule example: iptables -A INPUT -p tcp --dport 80 -s TRUSTED_NETWORK -j ACCEPT
# iptables -A INPUT -p tcp --dport 443 -s TRUSTED_NETWORK -j ACCEPT

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate LiveConfig instances from untrusted networks
  • Deploy web application firewall (WAF) with directory traversal protection rules

🔍 How to Verify

Check if Vulnerable:

Test with curl: curl -v 'http://target/static/../../etc/passwd' - if returns sensitive file content, vulnerable

Check Version:

liveconfig --version or check web interface admin panel

Verify Fix Applied:

After patching, same test should return 404 or error instead of file content

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '..' or '../' patterns in /static/ path
  • Unusual file access patterns from single IP addresses
  • 404 errors for non-existent static files with traversal sequences

Network Indicators:

  • HTTP GET requests with directory traversal sequences in URL
  • Multiple rapid requests to /static/ endpoint from single source

SIEM Query:

source="web_logs" AND (url="*/static/*../*" OR url="*/static/*../*")

🔗 References

📤 Share & Export