CVE-2024-24550

8.1 HIGH

📋 TL;DR

This vulnerability in Bludit allows attackers with API token access to upload arbitrary files, including PHP files, leading to remote code execution on the server. It affects Bludit installations with exposed File API endpoints. Attackers can gain full control of affected systems.

💻 Affected Systems

Products:
  • Bludit
Versions: All versions prior to 4.0.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have or obtain API token; File API must be accessible

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, ransomware deployment, or use as attack infrastructure

🟠

Likely Case

Webshell installation allowing persistent access, data exfiltration, and lateral movement

🟢

If Mitigated

Limited impact if API tokens are properly secured and file uploads are restricted

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires API token but is straightforward once obtained

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.0

Vendor Advisory: https://www.redguard.ch/blog/2024/06/20/security-advisory-bludit/

Restart Required: No

Instructions:

1. Backup your Bludit installation. 2. Download Bludit 4.0.0 or later. 3. Replace existing files with new version. 4. Verify functionality.

🔧 Temporary Workarounds

Restrict File API Access

all

Block access to File API endpoints via web server configuration

# Apache: Add to .htaccess
<FilesMatch "api/file">
    Deny from all
</FilesMatch>
# Nginx: Add to server block
location ~ /api/file {
    deny all;
}

Disable PHP Execution in Uploads

all

Prevent PHP execution in upload directories

# Apache: Add to .htaccess
<FilesMatch "\.php$">
    Deny from all
</FilesMatch>
# Nginx: Add to server block
location ~ \.php$ {
    deny all;
}

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Bludit instances
  • Deploy WAF rules to block suspicious file upload patterns

🔍 How to Verify

Check if Vulnerable:

Check Bludit version in admin panel or via version.txt file

Check Version:

cat /path/to/bludit/bl-content/databases/site.php | grep version

Verify Fix Applied:

Confirm version is 4.0.0 or higher in admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads via API endpoints
  • PHP file creation in upload directories
  • Multiple failed API authentication attempts

Network Indicators:

  • POST requests to /api/file endpoints
  • Uploads of files with .php extensions

SIEM Query:

source="web_logs" AND (uri="/api/file" OR file_extension="php")

🔗 References

📤 Share & Export