CVE-2024-30143

4.3 MEDIUM

📋 TL;DR

This vulnerability in HCL AppScan Traffic Recorder allows attackers to bypass directory restrictions through filename manipulation, potentially accessing files outside intended directories. It affects users of HCL AppScan Traffic Recorder who process untrusted input files. Successful exploitation could lead to arbitrary file access or application disruption.

💻 Affected Systems

Products:
  • HCL AppScan Traffic Recorder
Versions: Versions prior to 10.4.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when processing files with special characters in filenames.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete takeover of the application or host system through arbitrary file access leading to remote code execution.

🟠

Likely Case

Unauthorized file system access, potential data leakage, or application disruption.

🟢

If Mitigated

Limited impact with proper input validation and file access controls in place.

🌐 Internet-Facing: MEDIUM - Requires file upload or processing capability, but could be exploited if application accepts external input.
🏢 Internal Only: MEDIUM - Internal users with access to file processing features could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to supply malicious filenames to the application, typically through file upload or processing features.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.4.0

Vendor Advisory: https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0117697

Restart Required: Yes

Instructions:

1. Download HCL AppScan Traffic Recorder version 10.4.0 or later from HCL support portal. 2. Backup current configuration and data. 3. Install the updated version following vendor instructions. 4. Restart the application and verify functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict filename validation to reject paths containing directory traversal sequences

Implement regex filter: ^[a-zA-Z0-9._-]+$ for filenames

Sandbox File Processing

linux

Process files in isolated directories with strict access controls

chroot /isolated_directory
setfacl -m u:appscan:rx /isolated_directory

🧯 If You Can't Patch

  • Restrict file upload capabilities to trusted sources only
  • Implement application-level file path validation and canonicalization

🔍 How to Verify

Check if Vulnerable:

Check current AppScan Traffic Recorder version - if below 10.4.0, system is vulnerable.

Check Version:

Check application About dialog or installation directory for version information

Verify Fix Applied:

Verify installation of version 10.4.0 or later and test file processing with malicious filenames.

📡 Detection & Monitoring

Log Indicators:

  • Failed file access attempts with unusual path patterns
  • Application errors related to file not found or access denied

Network Indicators:

  • Unusual file upload patterns to the application

SIEM Query:

source="appscan_traffic_recorder" AND (event="file_access" OR event="file_error") AND path="*../*"

🔗 References

📤 Share & Export