CVE-2024-30143
📋 TL;DR
This vulnerability in HCL AppScan Traffic Recorder allows attackers to bypass directory restrictions through filename manipulation, potentially accessing files outside intended directories. It affects users of HCL AppScan Traffic Recorder who process untrusted input files. Successful exploitation could lead to arbitrary file access or application disruption.
💻 Affected Systems
- HCL AppScan Traffic Recorder
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete takeover of the application or host system through arbitrary file access leading to remote code execution.
Likely Case
Unauthorized file system access, potential data leakage, or application disruption.
If Mitigated
Limited impact with proper input validation and file access controls in place.
🎯 Exploit Status
Exploitation requires ability to supply malicious filenames to the application, typically through file upload or processing features.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 10.4.0
Vendor Advisory: https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0117697
Restart Required: Yes
Instructions:
1. Download HCL AppScan Traffic Recorder version 10.4.0 or later from HCL support portal. 2. Backup current configuration and data. 3. Install the updated version following vendor instructions. 4. Restart the application and verify functionality.
🔧 Temporary Workarounds
Input Validation Filter
allImplement strict filename validation to reject paths containing directory traversal sequences
Implement regex filter: ^[a-zA-Z0-9._-]+$ for filenames
Sandbox File Processing
linuxProcess files in isolated directories with strict access controls
chroot /isolated_directory
setfacl -m u:appscan:rx /isolated_directory
🧯 If You Can't Patch
- Restrict file upload capabilities to trusted sources only
- Implement application-level file path validation and canonicalization
🔍 How to Verify
Check if Vulnerable:
Check current AppScan Traffic Recorder version - if below 10.4.0, system is vulnerable.
Check Version:
Check application About dialog or installation directory for version information
Verify Fix Applied:
Verify installation of version 10.4.0 or later and test file processing with malicious filenames.
📡 Detection & Monitoring
Log Indicators:
- Failed file access attempts with unusual path patterns
- Application errors related to file not found or access denied
Network Indicators:
- Unusual file upload patterns to the application
SIEM Query:
source="appscan_traffic_recorder" AND (event="file_access" OR event="file_error") AND path="*../*"