CVE-2024-2635

7.3 HIGH

📋 TL;DR

CVE-2024-2635 exposes file paths through configuration pages in Cegid Meta4 HR that should not be internet-facing. This information disclosure vulnerability allows attackers to gather sensitive system information. Organizations using affected versions of Cegid Meta4 HR with these pages exposed to untrusted networks are at risk.

💻 Affected Systems

Products:
  • Cegid Meta4 HR
Versions: All versions containing the vulnerable configuration pages (specific version range not specified in advisory)
Operating Systems: Not OS-specific - affects the application itself
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in configuration pages that are not intended for internet-facing deployment. The vendor plans to remove these pages entirely in future releases.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain full file system paths and directory structures, enabling targeted attacks, reconnaissance for further exploitation, or data leakage of sensitive configuration details.

🟠

Likely Case

Information disclosure revealing internal file paths and system structure, which could be used for reconnaissance in multi-stage attacks.

🟢

If Mitigated

Minimal impact if configuration pages are properly isolated from untrusted networks as intended.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple information disclosure requiring only access to the exposed configuration pages. No authentication bypass or complex exploitation needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Future releases will remove the vulnerable pages entirely

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-meta4-hr-cegid

Restart Required: No

Instructions:

No patch available. Vendor recommends removing internet-facing exposure of configuration pages. Future releases will eliminate the vulnerable pages.

🔧 Temporary Workarounds

Network Isolation

all

Ensure configuration pages are not accessible from untrusted networks or the internet

Access Control

all

Implement strict network access controls and firewall rules to restrict access to configuration pages

🧯 If You Can't Patch

  • Implement network segmentation to isolate Meta4 HR configuration interfaces from untrusted networks
  • Deploy web application firewall (WAF) rules to block access to configuration page paths

🔍 How to Verify

Check if Vulnerable:

Check if configuration pages are accessible from untrusted networks. Attempt to access known configuration page URLs from an external network.

Check Version:

Check Meta4 HR version through application interface or consult vendor documentation

Verify Fix Applied:

Verify configuration pages are no longer accessible from untrusted networks or have been removed in updated versions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to configuration pages
  • External IP addresses accessing configuration interfaces

Network Indicators:

  • External requests to configuration page URLs
  • Information disclosure in HTTP responses

SIEM Query:

source_ip IN (external_ips) AND url_path CONTAINS '/config/' OR url_path CONTAINS '/admin/' AND application='Meta4_HR'

🔗 References

📤 Share & Export