CVE-2024-2599

9.9 CRITICAL

📋 TL;DR

CVE-2024-2599 is a file upload restriction evasion vulnerability in AMSS++ version 4.31 that allows authenticated users to bypass security controls and upload malicious files. This could lead to remote code execution via webshell deployment, potentially compromising the entire server infrastructure. Only AMSS++ 4.31 installations with authenticated user access are affected.

💻 Affected Systems

Products:
  • AMSS++
Versions: 4.31
Operating Systems: All platforms running AMSS++
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; default installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise leading to data exfiltration, lateral movement within the network, and complete system takeover.

🟠

Likely Case

Unauthorized file upload leading to webshell installation and limited remote code execution within the web application context.

🟢

If Mitigated

File upload attempts are blocked or detected, preventing successful exploitation while maintaining system integrity.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authentication is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 4.31 (check vendor for specific version)

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-amssplus-amss

Restart Required: Yes

Instructions:

1. Backup current installation and data. 2. Download latest AMSS++ version from official vendor. 3. Replace vulnerable files with patched version. 4. Restart web server and application services. 5. Verify functionality.

🔧 Temporary Workarounds

File Upload Restriction Enhancement

all

Implement strict file upload validation including file type checking, content verification, and size limits.

# Configure web server to block uploads of executable file types
# Implement server-side file validation in application code

Web Application Firewall Rules

all

Deploy WAF rules to detect and block file upload exploitation attempts.

# Add WAF rules for file upload filtering
# Configure rules to block suspicious upload patterns

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate AMSS++ servers from critical infrastructure
  • Deploy file integrity monitoring and restrict authenticated user privileges to minimum necessary

🔍 How to Verify

Check if Vulnerable:

Check AMSS++ version in admin panel or configuration files; version 4.31 is vulnerable.

Check Version:

Check AMSS++ admin interface or configuration files for version information

Verify Fix Applied:

Verify version is updated beyond 4.31 and test file upload functionality with restricted file types.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload activity
  • Multiple failed upload attempts
  • Successful uploads of executable file types

Network Indicators:

  • HTTP POST requests with file uploads to AMSS++ endpoints
  • Unusual outbound connections from web server

SIEM Query:

source="web_server" AND (uri="*upload*" OR method="POST") AND (file_extension="php" OR file_extension="jsp" OR file_extension="asp")

🔗 References

📤 Share & Export