CVE-2024-24393

9.8 CRITICAL

📋 TL;DR

This CVE describes a critical file upload vulnerability in Pichome v1.1.01 that allows remote attackers to upload malicious files and execute arbitrary code on the server. The vulnerability affects all systems running the vulnerable version of Pichome, potentially leading to complete system compromise.

💻 Affected Systems

Products:
  • Pichome
Versions: v1.1.01
Operating Systems: All platforms running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the index.php file upload functionality. Any Pichome installation with default configuration is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover with root/system-level access, data exfiltration, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Webshell deployment leading to data theft, credential harvesting, and lateral movement within the network.

🟢

If Mitigated

Attack blocked at web application firewall level with no file execution possible.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation allows direct attack from anywhere on the internet.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to network-based attacks.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple POST request with crafted file upload can trigger the vulnerability. GitHub issue shows exploitation details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider workarounds or alternative software.

🔧 Temporary Workarounds

File Upload Restriction

all

Implement strict file upload validation in index.php to block executable file types.

Modify index.php to validate file extensions and MIME types before accepting uploads

Web Application Firewall Rules

all

Block malicious file upload patterns at WAF level.

Configure WAF to block POST requests with suspicious file upload patterns to index.php

🧯 If You Can't Patch

  • Disable file upload functionality in Pichome completely
  • Isolate Pichome instance in network segment with strict outbound filtering

🔍 How to Verify

Check if Vulnerable:

Check if running Pichome v1.1.01 and test file upload functionality with malicious payload.

Check Version:

Check Pichome configuration files or web interface for version information

Verify Fix Applied:

Test file upload with various file types to ensure only allowed extensions are accepted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to index.php
  • POST requests with executable file extensions
  • Webshell creation in upload directories

Network Indicators:

  • HTTP POST requests to index.php with file uploads
  • Unusual outbound connections from Pichome server

SIEM Query:

source="web_logs" AND uri="/index.php" AND method="POST" AND (file_extension="php" OR file_extension="jsp" OR file_extension="asp")

🔗 References

📤 Share & Export