CVE-2024-24393
📋 TL;DR
This CVE describes a critical file upload vulnerability in Pichome v1.1.01 that allows remote attackers to upload malicious files and execute arbitrary code on the server. The vulnerability affects all systems running the vulnerable version of Pichome, potentially leading to complete system compromise.
💻 Affected Systems
- Pichome
📦 What is this software?
Pichome by Oaooa
⚠️ Risk & Real-World Impact
Worst Case
Complete server takeover with root/system-level access, data exfiltration, ransomware deployment, and persistent backdoor installation.
Likely Case
Webshell deployment leading to data theft, credential harvesting, and lateral movement within the network.
If Mitigated
Attack blocked at web application firewall level with no file execution possible.
🎯 Exploit Status
Simple POST request with crafted file upload can trigger the vulnerability. GitHub issue shows exploitation details.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Consider workarounds or alternative software.
🔧 Temporary Workarounds
File Upload Restriction
allImplement strict file upload validation in index.php to block executable file types.
Modify index.php to validate file extensions and MIME types before accepting uploads
Web Application Firewall Rules
allBlock malicious file upload patterns at WAF level.
Configure WAF to block POST requests with suspicious file upload patterns to index.php
🧯 If You Can't Patch
- Disable file upload functionality in Pichome completely
- Isolate Pichome instance in network segment with strict outbound filtering
🔍 How to Verify
Check if Vulnerable:
Check if running Pichome v1.1.01 and test file upload functionality with malicious payload.
Check Version:
Check Pichome configuration files or web interface for version information
Verify Fix Applied:
Test file upload with various file types to ensure only allowed extensions are accepted.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to index.php
- POST requests with executable file extensions
- Webshell creation in upload directories
Network Indicators:
- HTTP POST requests to index.php with file uploads
- Unusual outbound connections from Pichome server
SIEM Query:
source="web_logs" AND uri="/index.php" AND method="POST" AND (file_extension="php" OR file_extension="jsp" OR file_extension="asp")