CVE-2024-24042

8.8 HIGH

📋 TL;DR

A directory traversal vulnerability in Devan-Kerman ARRP v0.8.1 and earlier allows remote attackers to execute arbitrary code via the dumpDirect function in the RuntimeResourcePackImpl component. This affects systems running vulnerable versions of ARRP, potentially enabling complete system compromise.

💻 Affected Systems

Products:
  • Devan-Kerman ARRP
Versions: v0.8.1 and earlier
Operating Systems: All platforms running ARRP
Default Config Vulnerable: ⚠️ Yes
Notes: Any system with ARRP installed and accessible is vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Arbitrary file read/write leading to sensitive information disclosure or system manipulation.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely without authentication.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to exploitation from within the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept available in GitHub gist references. Exploitation appears straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in commit 7ea80db462c8bf66a0565e84fa49c1f2ecb9287b

Vendor Advisory: https://github.com/Devan-Kerman/ARRP/commit/7ea80db462c8bf66a0565e84fa49c1f2ecb9287b

Restart Required: Yes

Instructions:

1. Update ARRP to version after commit 7ea80db462c8bf66a0565e84fa49c1f2ecb9287b. 2. Restart the ARRP service. 3. Verify the fix is applied.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to ARRP services to trusted IP addresses only.

iptables -A INPUT -p tcp --dport [ARRP_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [ARRP_PORT] -j DROP

Disable ARRP Service

linux

Temporarily disable ARRP service until patching is complete.

systemctl stop arrp
systemctl disable arrp

🧯 If You Can't Patch

  • Isolate affected systems in a segmented network with strict access controls.
  • Implement application-level firewalls to monitor and block suspicious file path patterns.

🔍 How to Verify

Check if Vulnerable:

Check ARRP version. If version is 0.8.1 or earlier, system is vulnerable.

Check Version:

Check ARRP configuration files or run 'arrp --version' if available.

Verify Fix Applied:

Verify ARRP version is updated beyond commit 7ea80db462c8bf66a0565e84fa49c1f2ecb9287b and test directory traversal attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file path patterns in ARRP logs
  • Multiple failed directory traversal attempts
  • Unexpected file read/write operations

Network Indicators:

  • HTTP requests containing '../' patterns to ARRP endpoints
  • Unusual outbound connections from ARRP service

SIEM Query:

source="arrp.log" AND ("../" OR "..\\" OR "%2e%2e%2f")

🔗 References

📤 Share & Export