CVE-2024-2636

9.0 CRITICAL

📋 TL;DR

CVE-2024-2636 is an unrestricted file upload vulnerability in Cegid Meta4 HR that allows attackers to upload malicious JSP files to the server via the '/config/espanol/update_password.jsp' endpoint. By manipulating the 'M4_NEW_PASSWORD' parameter, attackers can execute arbitrary code when the uploaded file is loaded. Organizations using vulnerable versions of Cegid Meta4 HR are affected.

💻 Affected Systems

Products:
  • Cegid Meta4 HR
Versions: Specific versions not detailed in available references
Operating Systems: Windows Server (typical deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration via the update_password.jsp endpoint

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise leading to data theft, ransomware deployment, or complete system takeover

🟠

Likely Case

Unauthorized file upload leading to web shell installation and subsequent lateral movement

🟢

If Mitigated

File upload attempts blocked or detected before execution

🌐 Internet-Facing: HIGH - The vulnerable endpoint is accessible via web interface
🏢 Internal Only: HIGH - Internal attackers can exploit this vulnerability

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST request manipulation required; no authentication bypass needed

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-meta4-hr-cegid

Restart Required: Yes

Instructions:

1. Contact Cegid for latest security patches 2. Apply vendor-provided updates 3. Restart Meta4 HR services 4. Verify patch application

🔧 Temporary Workarounds

Block vulnerable endpoint

all

Restrict access to /config/espanol/update_password.jsp via web application firewall or server configuration

# WAF rule to block path: /config/espanol/update_password.jsp
# IIS: URL Rewrite rule to deny access to this path
# Apache: <Location "/config/espanol/update_password.jsp"> Deny from all </Location>

File upload restrictions

all

Implement strict file upload validation and store uploaded files outside web root

# Configure file upload restrictions in web.xml or application settings
# Set maximum file size limits
# Implement file type whitelisting

🧯 If You Can't Patch

  • Implement network segmentation to isolate Meta4 HR servers from critical systems
  • Deploy web application firewall with rules to detect and block malicious file upload patterns

🔍 How to Verify

Check if Vulnerable:

Test if /config/espanol/update_password.jsp accepts file uploads with modified M4_NEW_PASSWORD parameter

Check Version:

Check Meta4 HR version via administrative interface or consult vendor documentation

Verify Fix Applied:

Attempt exploitation after patch application; endpoint should reject malicious uploads

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /config/espanol/update_password.jsp with unusual parameters
  • File creation events in web directories with .jsp extensions
  • Unusual process execution from web server context

Network Indicators:

  • HTTP traffic to update_password.jsp endpoint with file upload patterns
  • Outbound connections from web server to suspicious IPs

SIEM Query:

source="web_server" AND (url="/config/espanol/update_password.jsp" OR file_extension=".jsp") AND action="upload"

🔗 References

📤 Share & Export