CVE-2024-30265
📋 TL;DR
CVE-2024-30265 is a local file inclusion vulnerability in Voilà dashboard deployments that allows attackers to download any file readable by the server process. This affects any Voilà deployment where the dashboard is accessible over the network, potentially exposing sensitive configuration files, credentials, or other system data. The risk level depends on whether authentication is required for the Voilà dashboard.
💻 Affected Systems
- Voilà Dashboard
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise through exposure of sensitive files like SSH keys, configuration files with credentials, or system files that enable privilege escalation.
Likely Case
Exfiltration of sensitive application data, configuration files, or user data stored in accessible directories.
If Mitigated
Limited impact if proper network segmentation, authentication, and file permissions are in place to restrict access to sensitive files.
🎯 Exploit Status
Exploitation is straightforward via crafted HTTP requests to access local files. Whether authentication is required depends on the specific Voilà deployment configuration.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 0.2.17, 0.3.8, 0.4.4, or 0.5.6 depending on your version line
Vendor Advisory: https://github.com/voila-dashboards/voila/security/advisories
Restart Required: Yes
Instructions:
1. Identify your current Voilà version. 2. Upgrade to the patched version for your release line: 0.2.x → 0.2.17, 0.3.x → 0.3.8, 0.4.x → 0.4.4, 0.5.x → 0.5.6. 3. Restart the Voilà service.
🔧 Temporary Workarounds
Network Access Restriction
linuxRestrict network access to Voilà dashboard using firewall rules or network segmentation
iptables -A INPUT -p tcp --dport [voila_port] -s [trusted_network] -j ACCEPT
iptables -A INPUT -p tcp --dport [voila_port] -j DROP
Authentication Enforcement
allEnsure Voilà dashboard requires authentication if not already configured
🧯 If You Can't Patch
- Implement strict network access controls to limit Voilà dashboard access to trusted IPs only
- Run Voilà with minimal file system permissions using a dedicated low-privilege user account
🔍 How to Verify
Check if Vulnerable:
Check if your Voilà version is below the patched versions: 0.2.17, 0.3.8, 0.4.4, or 0.5.6
Check Version:
voila --version
Verify Fix Applied:
Confirm version is at or above the patched version for your release line and test that local file inclusion attempts are blocked
📡 Detection & Monitoring
Log Indicators:
- Unusual file path access patterns in Voilà logs
- Requests for known sensitive file paths like /etc/passwd, configuration files
Network Indicators:
- HTTP requests with path traversal patterns to Voilà dashboard endpoints
SIEM Query:
source="voila.log" AND (url="*../*" OR url="*/etc/*" OR url="*/proc/*" OR url="*/sys/*")
🔗 References
- https://github.com/voila-dashboards/voila/commit/00d6362c237b6b4d466873535554d6076ead0c52
- https://github.com/voila-dashboards/voila/commit/28faacc9b03b160fd8fa920ad045f4ec0667ab67
- https://github.com/voila-dashboards/voila/commit/5542e4ae36bb5d184deaa48f95e76be477756af2
- https://github.com/voila-dashboards/voila/commit/98b6a40fec27723572314fdbba99bdc147d904c8
- https://github.com/voila-dashboards/voila/commit/c045be6988539d07cceeb9f82fc660a49485d504
- https://github.com/voila-dashboards/voila/security/advisories/GHSA-2q59-h24c-w6fg
- https://github.com/voila-dashboards/voila/commit/00d6362c237b6b4d466873535554d6076ead0c52
- https://github.com/voila-dashboards/voila/commit/28faacc9b03b160fd8fa920ad045f4ec0667ab67
- https://github.com/voila-dashboards/voila/commit/5542e4ae36bb5d184deaa48f95e76be477756af2
- https://github.com/voila-dashboards/voila/commit/98b6a40fec27723572314fdbba99bdc147d904c8
- https://github.com/voila-dashboards/voila/commit/c045be6988539d07cceeb9f82fc660a49485d504
- https://github.com/voila-dashboards/voila/security/advisories/GHSA-2q59-h24c-w6fg