CVE-2024-25859

7.1 HIGH

📋 TL;DR

A path traversal vulnerability in Blesta's upload directory allows attackers to access files outside intended boundaries. This can lead to account takeover and remote code execution. All Blesta installations before version 5.9.2 are affected.

💻 Affected Systems

Products:
  • Blesta
Versions: All versions before 5.9.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with the vulnerable upload directory path.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via arbitrary code execution leading to data theft, service disruption, and lateral movement within the network.

🟠

Likely Case

Account takeover of administrative or user accounts, potentially leading to privilege escalation and data exposure.

🟢

If Mitigated

Limited impact with proper file permissions and network segmentation, potentially only directory listing or file read access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires knowledge of the upload directory structure and may need authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.9.2

Vendor Advisory: https://www.blesta.com/2024/02/08/security-advisory/

Restart Required: No

Instructions:

1. Backup your Blesta installation and database. 2. Download Blesta 5.9.2 from the official website. 3. Replace all files with the new version. 4. Verify the installation works correctly.

🔧 Temporary Workarounds

Restrict upload directory access

all

Configure web server to deny direct access to the upload directory.

# For Apache: add 'Deny from all' to .htaccess in /path/to/uploads/
# For Nginx: add 'location /path/to/uploads/ { deny all; }' to server config

🧯 If You Can't Patch

  • Implement strict file permission controls on the upload directory.
  • Deploy a web application firewall (WAF) with path traversal protection rules.

🔍 How to Verify

Check if Vulnerable:

Check Blesta version in admin panel or via 'php -v' if CLI access available.

Check Version:

grep -r 'define.*VERSION_NUM' /path/to/blesta/installation/

Verify Fix Applied:

Confirm version is 5.9.2 or later in admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in /path/to/uploads/
  • Multiple failed attempts to access restricted paths

Network Indicators:

  • HTTP requests with '../' sequences targeting upload endpoints

SIEM Query:

source="web_logs" AND (uri="*../*" OR uri="*/path/to/uploads/*")

🔗 References

📤 Share & Export