CVE-2024-31947

6.5 MEDIUM

📋 TL;DR

Authenticated users in StoneFly Storage Concentrator (SC and SCVM) versions before 8.0.4.26 can exploit a directory traversal vulnerability via the Online Help facility's path parameter. This allows attackers to access sensitive system files and information. Only authenticated users with access to the system are affected.

💻 Affected Systems

Products:
  • StoneFly Storage Concentrator (SC)
  • StoneFly Storage Concentrator Virtual Machine (SCVM)
Versions: All versions before 8.0.4.26
Operating Systems: All supported OS for StoneFly Storage Concentrator
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to the Online Help facility.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive configuration files, credentials, or system data, potentially leading to full system compromise or data exfiltration.

🟠

Likely Case

Authenticated malicious users or compromised accounts accessing sensitive system information that should be restricted.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to information disclosure from accessible directories.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of the vulnerable path parameter.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.0.4.26

Vendor Advisory: https://stonefly.com/security-advisories/cve-2024-31947/

Restart Required: Yes

Instructions:

1. Download version 8.0.4.26 from StoneFly support portal. 2. Backup current configuration. 3. Apply the update following StoneFly's upgrade documentation. 4. Restart the Storage Concentrator service.

🔧 Temporary Workarounds

Restrict Online Help Access

all

Limit access to the Online Help facility to only necessary users via network controls or authentication restrictions.

Input Validation Rules

all

Implement web application firewall rules to block directory traversal patterns in path parameters.

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can access the Online Help facility.
  • Monitor and audit all access to the Online Help facility for suspicious path patterns.

🔍 How to Verify

Check if Vulnerable:

Check the StoneFly Storage Concentrator version via the web interface or CLI. If version is below 8.0.4.26, the system is vulnerable.

Check Version:

ssh admin@storage-concentrator-ip 'show version' or check via web interface System > About

Verify Fix Applied:

After patching, verify the version shows 8.0.4.26 or higher and test that directory traversal attempts via the Online Help path parameter are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual path patterns in Online Help access logs containing '../' or similar traversal sequences
  • Multiple failed attempts to access restricted paths via Online Help

Network Indicators:

  • HTTP requests to Online Help endpoints with suspicious path parameters

SIEM Query:

source="stonefly_logs" AND (path="*../*" OR path="*..\\*" OR path="*%2e%2e%2f*") AND endpoint="*help*"

🔗 References

📤 Share & Export