CVE-2024-28064

9.8 CRITICAL

📋 TL;DR

CVE-2024-28064 is a critical path traversal vulnerability in Kiteworks Totemomail that allows unauthenticated attackers to read, delete, and write arbitrary files on the server. This affects Totemomail 7.x and 8.x before version 8.3.0. The vulnerability is exploitable via the /responsiveUI/EnvelopeOpenServlet endpoint with specific parameters.

💻 Affected Systems

Products:
  • Kiteworks Totemomail
Versions: 7.x and 8.x before 8.3.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configurations and requires no authentication to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including data exfiltration, file destruction, backdoor installation, and potential lateral movement to other systems.

🟠

Likely Case

Unauthorized access to sensitive email data, configuration files, and credentials stored on the server, potentially leading to data breach and system manipulation.

🟢

If Mitigated

Limited impact if proper network segmentation, WAF rules, and access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Detailed technical advisory with exploitation details is publicly available. The vulnerability requires minimal technical skill to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.3.0

Vendor Advisory: https://www.objectif-securite.ch/advisories/totemomail-path-traversal.txt

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Download Totemomail version 8.3.0 or later from official vendor sources. 3. Follow vendor upgrade documentation to apply the patch. 4. Restart the Totemomail service. 5. Verify the fix is applied.

🔧 Temporary Workarounds

WAF Rule Implementation

all

Implement web application firewall rules to block path traversal patterns in requests to /responsiveUI/EnvelopeOpenServlet

WAF-specific configuration commands vary by platform

Access Control Restriction

linux

Restrict network access to Totemomail interface to trusted IP addresses only

iptables -A INPUT -p tcp --dport [totemomail-port] -s [trusted-ip] -j ACCEPT
iptables -A INPUT -p tcp --dport [totemomail-port] -j DROP

🧯 If You Can't Patch

  • Immediately isolate the Totemomail server from internet access and restrict to internal trusted networks only.
  • Implement strict monitoring and alerting for any access attempts to the vulnerable endpoint with path traversal patterns.

🔍 How to Verify

Check if Vulnerable:

Check if Totemomail version is below 8.3.0 and test for path traversal via /responsiveUI/EnvelopeOpenServlet with messageId parameter containing ../ sequences.

Check Version:

Check Totemomail admin interface or configuration files for version information specific to your deployment.

Verify Fix Applied:

Verify Totemomail version is 8.3.0 or higher and test that path traversal attempts via the vulnerable endpoint are properly blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /responsiveUI/EnvelopeOpenServlet with ../ sequences in parameters
  • Unusual file access patterns from web server process
  • Failed file operations from web application

Network Indicators:

  • HTTP requests containing path traversal patterns (../, ..\, %2e%2e%2f)
  • Unusual outbound data transfers from Totemomail server

SIEM Query:

source="totemomail_logs" AND (uri_path="/responsiveUI/EnvelopeOpenServlet" AND (param="../" OR param="..\\" OR param LIKE "%..%"))

🔗 References

📤 Share & Export