CVE-2024-2599
📋 TL;DR
CVE-2024-2599 is a file upload restriction evasion vulnerability in AMSS++ version 4.31 that allows authenticated users to bypass security controls and upload malicious files. This could lead to remote code execution via webshell deployment, potentially compromising the entire server infrastructure. Only AMSS++ 4.31 installations with authenticated user access are affected.
💻 Affected Systems
- AMSS++
📦 What is this software?
Amss\+\+ by Amss\+\+ Project
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise leading to data exfiltration, lateral movement within the network, and complete system takeover.
Likely Case
Unauthorized file upload leading to webshell installation and limited remote code execution within the web application context.
If Mitigated
File upload attempts are blocked or detected, preventing successful exploitation while maintaining system integrity.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once authentication is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version after 4.31 (check vendor for specific version)
Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-amssplus-amss
Restart Required: Yes
Instructions:
1. Backup current installation and data. 2. Download latest AMSS++ version from official vendor. 3. Replace vulnerable files with patched version. 4. Restart web server and application services. 5. Verify functionality.
🔧 Temporary Workarounds
File Upload Restriction Enhancement
allImplement strict file upload validation including file type checking, content verification, and size limits.
# Configure web server to block uploads of executable file types
# Implement server-side file validation in application code
Web Application Firewall Rules
allDeploy WAF rules to detect and block file upload exploitation attempts.
# Add WAF rules for file upload filtering
# Configure rules to block suspicious upload patterns
🧯 If You Can't Patch
- Implement strict network segmentation to isolate AMSS++ servers from critical infrastructure
- Deploy file integrity monitoring and restrict authenticated user privileges to minimum necessary
🔍 How to Verify
Check if Vulnerable:
Check AMSS++ version in admin panel or configuration files; version 4.31 is vulnerable.
Check Version:
Check AMSS++ admin interface or configuration files for version information
Verify Fix Applied:
Verify version is updated beyond 4.31 and test file upload functionality with restricted file types.
📡 Detection & Monitoring
Log Indicators:
- Unusual file upload activity
- Multiple failed upload attempts
- Successful uploads of executable file types
Network Indicators:
- HTTP POST requests with file uploads to AMSS++ endpoints
- Unusual outbound connections from web server
SIEM Query:
source="web_server" AND (uri="*upload*" OR method="POST") AND (file_extension="php" OR file_extension="jsp" OR file_extension="asp")