CVE-2024-2632

7.5 HIGH

📋 TL;DR

An information exposure vulnerability in Meta4 HR allows unauthenticated attackers to access sensitive system information via a specific JSP endpoint. This exposes application variables, Tomcat versions, library versions, and operating system details. Organizations using vulnerable Meta4 HR installations are affected.

💻 Affected Systems

Products:
  • Meta4 HR
Versions: Specific versions not detailed in advisory, but all versions with the vulnerable endpoint are affected
Operating Systems: Any OS running Meta4 HR
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the '/sitetest/english/dumpenv.jsp' endpoint which appears to be a diagnostic page that should not be publicly accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gather detailed system information to plan targeted attacks, potentially leading to full system compromise through chained exploits using exposed version data.

🟠

Likely Case

Information leakage enables reconnaissance for further attacks, exposing system architecture and potentially sensitive configuration data.

🟢

If Mitigated

Limited exposure with proper network segmentation and access controls preventing external access to the vulnerable endpoint.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP GET request to the vulnerable endpoint returns sensitive information without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-meta4-hr-cegid

Restart Required: No

Instructions:

1. Consult vendor for patch availability 2. Remove or restrict access to '/sitetest/english/dumpenv.jsp' 3. Apply vendor-recommended updates when available

🔧 Temporary Workarounds

Block vulnerable endpoint

all

Restrict access to the '/sitetest/english/dumpenv.jsp' endpoint using web server configuration or firewall rules

# Apache: RewriteRule ^/sitetest/english/dumpenv\.jsp$ - [F]
# Nginx: location ~ ^/sitetest/english/dumpenv\.jsp$ { return 403; }
# IIS: Add request filtering rule to block /sitetest/english/dumpenv.jsp

Remove diagnostic files

all

Delete or rename the vulnerable JSP file from the web application directory

# Linux: rm /path/to/webapp/sitetest/english/dumpenv.jsp
# Windows: del C:\path\to\webapp\sitetest\english\dumpenv.jsp

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Meta4 HR application
  • Deploy a web application firewall (WAF) with rules to block requests to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Send HTTP GET request to http://[target]/sitetest/english/dumpenv.jsp and check if it returns system information

Check Version:

Check Meta4 HR version through admin interface or consult vendor documentation

Verify Fix Applied:

Attempt the same request after remediation - should return 403/404 error or no sensitive data

📡 Detection & Monitoring

Log Indicators:

  • HTTP GET requests to '/sitetest/english/dumpenv.jsp' in web server logs
  • Unusual access patterns to diagnostic endpoints

Network Indicators:

  • HTTP traffic to the vulnerable endpoint from unauthorized sources
  • Information disclosure in HTTP responses

SIEM Query:

source="web_server" AND url="/sitetest/english/dumpenv.jsp" AND method="GET"

🔗 References

📤 Share & Export