CVE-2024-29466

8.8 HIGH

📋 TL;DR

A directory traversal vulnerability in lsgwr spring boot online exam version 0.9 allows attackers to read arbitrary files and potentially execute arbitrary code via the FileTransUtil.java component. This affects all systems running the vulnerable version of this online exam software. Attackers can exploit this to compromise the server and access sensitive data.

💻 Affected Systems

Products:
  • lsgwr spring boot online exam
Versions: 0.9
Operating Systems: Any OS running Java/Spring Boot
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of version 0.9 are vulnerable. The vulnerability is in the FileTransUtil.java component which handles file operations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise leading to data theft, ransomware deployment, or use as a foothold for lateral movement within the network.

🟠

Likely Case

Unauthorized file access including configuration files, credentials, and sensitive exam data, potentially leading to data breach.

🟢

If Mitigated

Limited impact with proper network segmentation, file system permissions, and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code exists in the referenced GitHub gist. Directory traversal vulnerabilities are typically easy to exploit with basic HTTP requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: No official vendor advisory found

Restart Required: No

Instructions:

1. Check for updated version from the software vendor. 2. If no patch available, implement workarounds. 3. Consider replacing with alternative software if maintenance is abandoned.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Add input validation to reject directory traversal sequences in file paths

Implement path normalization and validation in FileTransUtil.java

Web Application Firewall Rules

all

Block requests containing directory traversal patterns

Add WAF rules to block ../, ..\, and similar traversal patterns

🧯 If You Can't Patch

  • Isolate the vulnerable system behind a reverse proxy with strict input validation
  • Implement network segmentation to limit potential lateral movement if compromised

🔍 How to Verify

Check if Vulnerable:

Check if running lsgwr spring boot online exam version 0.9. Test by attempting to access files outside web root using ../ sequences in file parameters.

Check Version:

Check application version in pom.xml or application properties files

Verify Fix Applied:

Test that directory traversal attempts are blocked and return appropriate error responses.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing ../ or ..\ patterns
  • File access errors for paths outside expected directories
  • Unusual file read operations

Network Indicators:

  • HTTP requests with encoded traversal sequences (%2e%2e%2f)
  • Multiple failed file access attempts

SIEM Query:

source="web_server" AND (uri="*../*" OR uri="*..\\*" OR uri="*%2e%2e%2f*")

🔗 References

📤 Share & Export