CVE-2024-31818
📋 TL;DR
A directory traversal vulnerability in DerbyNet v9.0 allows remote attackers to execute arbitrary code via the 'page' parameter in kiosk.php. This affects all systems running vulnerable DerbyNet installations, potentially enabling complete system compromise.
💻 Affected Systems
- DerbyNet
📦 What is this software?
Derbynet by Derbynet
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to full system compromise, data theft, ransomware deployment, or use as a foothold for lateral movement.
Likely Case
Arbitrary file read/write leading to sensitive information disclosure, configuration modification, or limited code execution.
If Mitigated
Limited impact if proper network segmentation, WAF rules, and file permission restrictions are in place.
🎯 Exploit Status
The vulnerability is well-documented with public proof-of-concept available. Exploitation requires minimal technical skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Consider upgrading to a newer version if available, or apply workarounds.
🔧 Temporary Workarounds
Input Validation for page parameter
allAdd strict input validation to kiosk.php to restrict the 'page' parameter to allowed values only.
Modify kiosk.php to validate the 'page' parameter against a whitelist of allowed pages
Web Application Firewall Rule
allBlock directory traversal attempts in the page parameter.
Add WAF rule to block requests containing '../', '..\', or similar traversal patterns in URL parameters
🧯 If You Can't Patch
- Restrict network access to DerbyNet instance using firewall rules
- Implement strict file system permissions to limit what files can be accessed/modified
🔍 How to Verify
Check if Vulnerable:
Test if accessing kiosk.php with a traversal payload (e.g., kiosk.php?page=../../../etc/passwd) returns sensitive system files.
Check Version:
Check DerbyNet version in configuration files or web interface
Verify Fix Applied:
Verify that traversal attempts no longer succeed and return appropriate error messages.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to kiosk.php with suspicious 'page' parameter values containing '../', '..\', or similar patterns
Network Indicators:
- Unusual file access patterns from DerbyNet server, unexpected outbound connections
SIEM Query:
source="web_logs" AND uri="*kiosk.php*" AND (param="*../*" OR param="*..\\*")
🔗 References
- https://chocapikk.com/posts/2024/derbynet-vulnerabilities/
- https://github.com/jeffpiazza/derbynet/blob/1ae0bb55c3990dec8fd9b9f4a82400be9a75de92/website/kiosk.php
- https://chocapikk.com/posts/2024/derbynet-vulnerabilities/
- https://github.com/jeffpiazza/derbynet/blob/1ae0bb55c3990dec8fd9b9f4a82400be9a75de92/website/kiosk.php