CVE-2024-24386

7.2 HIGH

📋 TL;DR

This vulnerability in VitalPBX allows attackers to execute arbitrary code by uploading crafted payloads to the /var/lib/vitalpbx/scripts folder. It affects VitalPBX version 3.2.4-5 installations. Attackers can achieve remote code execution with potentially severe consequences.

💻 Affected Systems

Products:
  • VitalPBX
Versions: 3.2.4-5
Operating Systems: Linux-based systems running VitalPBX
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations where the scripts folder has insufficient access controls.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to install backdoors, exfiltrate sensitive data, pivot to other systems, or disrupt telephony services.

🟠

Likely Case

Attacker gains shell access to the VitalPBX server, potentially compromising call records, credentials, and system configuration.

🟢

If Mitigated

Limited impact if proper file permissions, network segmentation, and monitoring are in place to detect unauthorized file uploads.

🌐 Internet-Facing: HIGH - If VitalPBX web interface is exposed to the internet, attackers can directly exploit this vulnerability.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this to gain elevated privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code exists on GitHub, making exploitation straightforward for attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Upgrade to a newer version if available or apply workarounds.

🔧 Temporary Workarounds

Restrict scripts folder permissions

linux

Change permissions on the vulnerable folder to prevent unauthorized file uploads

chmod 750 /var/lib/vitalpbx/scripts
chown root:root /var/lib/vitalpbx/scripts

Implement file upload validation

all

Add validation to reject unauthorized file types in upload functionality

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate VitalPBX from untrusted networks
  • Deploy file integrity monitoring on the /var/lib/vitalpbx/scripts directory

🔍 How to Verify

Check if Vulnerable:

Check if VitalPBX version is 3.2.4-5 and if /var/lib/vitalpbx/scripts has insecure permissions (world-writable or owned by non-root user)

Check Version:

vitalpbx-version or check /etc/vitalpbx/version

Verify Fix Applied:

Verify folder permissions are 750 and owned by root:root, and test that unauthorized file uploads are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized file creation in /var/lib/vitalpbx/scripts
  • Suspicious process execution from scripts folder
  • Web server logs showing upload attempts to scripts endpoints

Network Indicators:

  • Unusual outbound connections from VitalPBX server
  • Traffic patterns suggesting command and control activity

SIEM Query:

source="vitalpbx" AND (event="file_upload" OR event="script_execution") AND path="/var/lib/vitalpbx/scripts/*"

🔗 References

📤 Share & Export