CVE-2024-28265

9.1 CRITICAL

📋 TL;DR

IBOS v4.5.5 contains an arbitrary file deletion vulnerability in the LoginController.php component. This allows attackers to delete arbitrary files on the server, potentially disrupting system functionality or enabling further attacks. All systems running the vulnerable version are affected.

💻 Affected Systems

Products:
  • IBOS
Versions: v4.5.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the dashboard module's LoginController.php file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files, leading to service disruption, data loss, or enabling privilege escalation by removing security controls.

🟠

Likely Case

Service disruption through deletion of application files, configuration files, or user data, potentially causing downtime and data loss.

🟢

If Mitigated

Limited impact if proper file permissions and access controls prevent deletion of critical files, though application files remain vulnerable.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Vulnerability is in a publicly accessible controller with simple file path manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://gitee.com/ibos/IBOS

Restart Required: No

Instructions:

Check the official IBOS repository for security updates. If no patch is available, consider upgrading to a newer version or implementing workarounds.

🔧 Temporary Workarounds

Restrict access to vulnerable endpoint

all

Block or restrict access to the vulnerable LoginController.php file via web server configuration or firewall rules.

# Apache: Add to .htaccess
<Files "LoginController.php">
    Order Deny,Allow
    Deny from all
</Files>
# Nginx: Add to server block
location ~* /system/modules/dashboard/controllers/LoginController\.php$ {
    deny all;
}

Implement file permission restrictions

linux

Set strict file permissions to prevent deletion of critical files.

# Linux: Protect critical directories
chmod -R 755 /var/www/html/
chown -R www-data:www-data /var/www/html/
# Set immutable flag on critical files
chattr +i /etc/passwd /etc/shadow /etc/hosts

🧯 If You Can't Patch

  • Implement strict file system monitoring and alerting for unauthorized file deletion attempts.
  • Deploy web application firewall (WAF) rules to block requests containing file path traversal patterns.

🔍 How to Verify

Check if Vulnerable:

Check if your IBOS installation is version 4.5.5 and if the file /system/modules/dashboard/controllers/LoginController.php exists without proper input validation.

Check Version:

Check the version.php file or admin panel for IBOS version information.

Verify Fix Applied:

Test if file deletion attempts through the vulnerable endpoint are blocked or properly validated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events in system logs
  • HTTP requests to LoginController.php with file path parameters
  • Error logs showing file not found errors for system files

Network Indicators:

  • HTTP POST/GET requests containing file paths to the vulnerable endpoint
  • Unusual traffic patterns to the dashboard module

SIEM Query:

source="web_access_logs" AND (uri="/system/modules/dashboard/controllers/LoginController.php" OR uri LIKE "%LoginController.php%") AND (query_string LIKE "%file=%" OR query_string LIKE "%path=%")

🔗 References

📤 Share & Export