CVE-2024-24230

7.5 HIGH

📋 TL;DR

Komm.One CMS 10.4.2.14 has a Server-Side Template Injection vulnerability in the Velocity template engine that allows remote attackers to execute arbitrary operating system commands. This enables complete system compromise of affected web servers. Any organization running this specific version of Komm.One CMS is vulnerable.

💻 Affected Systems

Products:
  • Komm.One CMS
Versions: 10.4.2.14
Operating Systems: Any OS running Komm.One CMS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 10.4.2.14 are vulnerable by default. No special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the web server, allowing data theft, lateral movement, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to web server compromise, data exfiltration, and potential pivot to internal network resources.

🟢

If Mitigated

Limited impact with proper network segmentation, web application firewalls, and minimal privileges reducing lateral movement capabilities.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires simple HTTP requests with crafted Velocity template payloads. Public technical details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

1. Check vendor website for security updates. 2. Upgrade to patched version when available. 3. Apply workarounds immediately.

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block Velocity template injection patterns in HTTP requests

WAF specific - configure to block patterns containing java.lang.Runtime, getRuntime(), exec(), and Velocity template syntax

Input Validation Filter

all

Filter Velocity template syntax from user inputs

Implement input validation to strip or reject Velocity template directives ($, #, @ symbols with specific patterns)

🧯 If You Can't Patch

  • Isolate affected systems in separate network segments with strict firewall rules
  • Implement strict network monitoring and alerting for suspicious outbound connections

🔍 How to Verify

Check if Vulnerable:

Check Komm.One CMS version in admin panel or configuration files. If version is 10.4.2.14, system is vulnerable.

Check Version:

Check CMS admin interface or examine configuration files for version information

Verify Fix Applied:

Verify version has been upgraded beyond 10.4.2.14 and test with safe SSTI payloads.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing Velocity template syntax
  • Requests with java.lang.Runtime, getRuntime(), exec() patterns
  • Unusual process execution from web server user

Network Indicators:

  • Outbound connections from web server to unusual destinations
  • Command and control traffic patterns

SIEM Query:

web_requests: *java.lang.Runtime* OR *getRuntime* OR *exec(* AND source_ip: [web_server_ip]

🔗 References

📤 Share & Export