CVE-2024-24042
📋 TL;DR
A directory traversal vulnerability in Devan-Kerman ARRP v0.8.1 and earlier allows remote attackers to execute arbitrary code via the dumpDirect function in the RuntimeResourcePackImpl component. This affects systems running vulnerable versions of ARRP, potentially enabling complete system compromise.
💻 Affected Systems
- Devan-Kerman ARRP
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to full system compromise, data exfiltration, and lateral movement within the network.
Likely Case
Arbitrary file read/write leading to sensitive information disclosure or system manipulation.
If Mitigated
Limited impact with proper network segmentation and access controls preventing exploitation.
🎯 Exploit Status
Proof of concept available in GitHub gist references. Exploitation appears straightforward.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Fixed in commit 7ea80db462c8bf66a0565e84fa49c1f2ecb9287b
Vendor Advisory: https://github.com/Devan-Kerman/ARRP/commit/7ea80db462c8bf66a0565e84fa49c1f2ecb9287b
Restart Required: Yes
Instructions:
1. Update ARRP to version after commit 7ea80db462c8bf66a0565e84fa49c1f2ecb9287b. 2. Restart the ARRP service. 3. Verify the fix is applied.
🔧 Temporary Workarounds
Network Access Restriction
linuxRestrict network access to ARRP services to trusted IP addresses only.
iptables -A INPUT -p tcp --dport [ARRP_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [ARRP_PORT] -j DROP
Disable ARRP Service
linuxTemporarily disable ARRP service until patching is complete.
systemctl stop arrp
systemctl disable arrp
🧯 If You Can't Patch
- Isolate affected systems in a segmented network with strict access controls.
- Implement application-level firewalls to monitor and block suspicious file path patterns.
🔍 How to Verify
Check if Vulnerable:
Check ARRP version. If version is 0.8.1 or earlier, system is vulnerable.
Check Version:
Check ARRP configuration files or run 'arrp --version' if available.
Verify Fix Applied:
Verify ARRP version is updated beyond commit 7ea80db462c8bf66a0565e84fa49c1f2ecb9287b and test directory traversal attempts are blocked.
📡 Detection & Monitoring
Log Indicators:
- Unusual file path patterns in ARRP logs
- Multiple failed directory traversal attempts
- Unexpected file read/write operations
Network Indicators:
- HTTP requests containing '../' patterns to ARRP endpoints
- Unusual outbound connections from ARRP service
SIEM Query:
source="arrp.log" AND ("../" OR "..\\" OR "%2e%2e%2f")
🔗 References
- https://gist.github.com/apple502j/193358682885fe1a6708309ce934e4ed
- https://github.com/Devan-Kerman/ARRP/commit/7ea80db462c8bf66a0565e84fa49c1f2ecb9287b
- https://gist.github.com/apple502j/193358682885fe1a6708309ce934e4ed
- https://github.com/Devan-Kerman/ARRP/commit/7ea80db462c8bf66a0565e84fa49c1f2ecb9287b