CVE-2024-24386
📋 TL;DR
This vulnerability in VitalPBX allows attackers to execute arbitrary code by uploading crafted payloads to the /var/lib/vitalpbx/scripts folder. It affects VitalPBX version 3.2.4-5 installations. Attackers can achieve remote code execution with potentially severe consequences.
💻 Affected Systems
- VitalPBX
📦 What is this software?
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
Vitalpbx by Vitalpbx
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attacker to install backdoors, exfiltrate sensitive data, pivot to other systems, or disrupt telephony services.
Likely Case
Attacker gains shell access to the VitalPBX server, potentially compromising call records, credentials, and system configuration.
If Mitigated
Limited impact if proper file permissions, network segmentation, and monitoring are in place to detect unauthorized file uploads.
🎯 Exploit Status
Public proof-of-concept code exists on GitHub, making exploitation straightforward for attackers with basic skills.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Upgrade to a newer version if available or apply workarounds.
🔧 Temporary Workarounds
Restrict scripts folder permissions
linuxChange permissions on the vulnerable folder to prevent unauthorized file uploads
chmod 750 /var/lib/vitalpbx/scripts
chown root:root /var/lib/vitalpbx/scripts
Implement file upload validation
allAdd validation to reject unauthorized file types in upload functionality
🧯 If You Can't Patch
- Implement strict network segmentation to isolate VitalPBX from untrusted networks
- Deploy file integrity monitoring on the /var/lib/vitalpbx/scripts directory
🔍 How to Verify
Check if Vulnerable:
Check if VitalPBX version is 3.2.4-5 and if /var/lib/vitalpbx/scripts has insecure permissions (world-writable or owned by non-root user)
Check Version:
vitalpbx-version or check /etc/vitalpbx/version
Verify Fix Applied:
Verify folder permissions are 750 and owned by root:root, and test that unauthorized file uploads are blocked
📡 Detection & Monitoring
Log Indicators:
- Unauthorized file creation in /var/lib/vitalpbx/scripts
- Suspicious process execution from scripts folder
- Web server logs showing upload attempts to scripts endpoints
Network Indicators:
- Unusual outbound connections from VitalPBX server
- Traffic patterns suggesting command and control activity
SIEM Query:
source="vitalpbx" AND (event="file_upload" OR event="script_execution") AND path="/var/lib/vitalpbx/scripts/*"