CVE-2024-25674

9.8 CRITICAL

📋 TL;DR

This vulnerability in MISP allows attackers to upload malicious files disguised as organization logos due to insufficient file extension and MIME type validation. Attackers could execute arbitrary code on the server, affecting all MISP instances running vulnerable versions. Organizations using MISP for threat intelligence sharing are at risk.

💻 Affected Systems

Products:
  • MISP (Malware Information Sharing Platform)
Versions: All versions before 2.4.184
Operating Systems: All platforms running MISP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all MISP installations with organization logo upload functionality enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, and lateral movement within the network.

🟠

Likely Case

File upload leading to web shell deployment, data exfiltration, or denial of service.

🟢

If Mitigated

Limited impact with proper file validation and restricted upload permissions.

🌐 Internet-Facing: HIGH - Exploitable remotely without authentication via organization logo upload feature.
🏢 Internal Only: MEDIUM - Requires internal access but could still lead to significant compromise.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.184

Vendor Advisory: https://github.com/MISP/MISP/commit/312d2d5422235235ddd211dcb6bb5bb09c07791f

Restart Required: Yes

Instructions:

1. Backup your MISP instance and database. 2. Update MISP to version 2.4.184 or later using git pull or package manager. 3. Restart the web server and MISP workers. 4. Verify the fix by checking the version.

🔧 Temporary Workarounds

Disable organization logo upload

all

Temporarily disable the organization logo upload feature to prevent exploitation.

Edit MISP configuration to remove logo upload functionality or restrict access to admin users only.

Implement web application firewall rules

all

Block malicious file uploads at the WAF level.

Configure WAF to block uploads with suspicious file extensions or MIME types.

🧯 If You Can't Patch

  • Restrict access to organization management features to trusted administrators only.
  • Implement strict file validation at the application or reverse proxy level.

🔍 How to Verify

Check if Vulnerable:

Check if MISP version is below 2.4.184 by accessing the web interface or checking configuration files.

Check Version:

Check MISP web interface dashboard or run: grep -i version /var/www/MISP/app/Config/config.php

Verify Fix Applied:

Confirm MISP version is 2.4.184 or higher and test logo upload with malicious files to ensure they are rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to organization logo endpoint
  • Failed upload attempts with suspicious file types
  • Unexpected process execution from web server

Network Indicators:

  • HTTP POST requests to /organisations/uploadLogo with unusual file extensions
  • Outbound connections from MISP server to unknown IPs

SIEM Query:

source="misp_logs" AND (url_path="/organisations/uploadLogo" AND (file_extension="php" OR file_extension="exe"))

🔗 References

📤 Share & Export