CVE-2024-24525

9.8 CRITICAL

📋 TL;DR

A critical remote code execution vulnerability in EpointWebBuilder allows attackers to execute arbitrary code via the infoid parameter. This affects all systems running vulnerable versions of EpointWebBuilder, potentially compromising entire web servers and their data.

💻 Affected Systems

Products:
  • EpointWebBuilder
Versions: 5.1.0-sp1, 5.2.1-sp1, 5.4.1, 5.4.2
Operating Systems: Any OS running EpointWebBuilder
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install malware, steal sensitive data, pivot to internal networks, and maintain persistent access.

🟠

Likely Case

Web server compromise leading to data theft, defacement, or use as a foothold for further attacks within the network.

🟢

If Mitigated

Limited impact if proper network segmentation, WAF rules, and least privilege principles are implemented.

🌐 Internet-Facing: HIGH - Directly exploitable via HTTP requests without authentication.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to authenticated or unauthenticated attackers on the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept exists, making exploitation trivial for attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation for the infoid parameter to block malicious payloads.

Modify application code to sanitize and validate infoid parameter values

Web Application Firewall Rules

all

Deploy WAF rules to block requests containing suspicious patterns in the infoid parameter.

Add WAF rule: Block requests where infoid parameter contains executable code patterns

🧯 If You Can't Patch

  • Isolate affected systems in a segmented network zone with strict inbound/outbound controls.
  • Implement network-based intrusion detection to monitor for exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check if EpointWebBuilder version matches affected versions. Test with controlled payload in infoid parameter.

Check Version:

Check application configuration files or admin interface for version information.

Verify Fix Applied:

Test that infoid parameter no longer executes arbitrary code and returns appropriate error handling.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST/GET requests with infoid parameter containing executable code patterns
  • System process creation from web server user

Network Indicators:

  • HTTP requests with suspicious payloads in infoid parameter
  • Outbound connections from web server to unknown destinations

SIEM Query:

source="web_logs" AND (infoid CONTAINS "cmd.exe" OR infoid CONTAINS "/bin/sh" OR infoid CONTAINS "powershell")

🔗 References

📤 Share & Export