CVE-2024-31947
📋 TL;DR
Authenticated users in StoneFly Storage Concentrator (SC and SCVM) versions before 8.0.4.26 can exploit a directory traversal vulnerability via the Online Help facility's path parameter. This allows attackers to access sensitive system files and information. Only authenticated users with access to the system are affected.
💻 Affected Systems
- StoneFly Storage Concentrator (SC)
- StoneFly Storage Concentrator Virtual Machine (SCVM)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could read sensitive configuration files, credentials, or system data, potentially leading to full system compromise or data exfiltration.
Likely Case
Authenticated malicious users or compromised accounts accessing sensitive system information that should be restricted.
If Mitigated
With proper access controls and monitoring, impact is limited to information disclosure from accessible directories.
🎯 Exploit Status
Exploitation requires authenticated access and knowledge of the vulnerable path parameter.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 8.0.4.26
Vendor Advisory: https://stonefly.com/security-advisories/cve-2024-31947/
Restart Required: Yes
Instructions:
1. Download version 8.0.4.26 from StoneFly support portal. 2. Backup current configuration. 3. Apply the update following StoneFly's upgrade documentation. 4. Restart the Storage Concentrator service.
🔧 Temporary Workarounds
Restrict Online Help Access
allLimit access to the Online Help facility to only necessary users via network controls or authentication restrictions.
Input Validation Rules
allImplement web application firewall rules to block directory traversal patterns in path parameters.
🧯 If You Can't Patch
- Implement strict access controls to limit which users can access the Online Help facility.
- Monitor and audit all access to the Online Help facility for suspicious path patterns.
🔍 How to Verify
Check if Vulnerable:
Check the StoneFly Storage Concentrator version via the web interface or CLI. If version is below 8.0.4.26, the system is vulnerable.
Check Version:
ssh admin@storage-concentrator-ip 'show version' or check via web interface System > About
Verify Fix Applied:
After patching, verify the version shows 8.0.4.26 or higher and test that directory traversal attempts via the Online Help path parameter are blocked.
📡 Detection & Monitoring
Log Indicators:
- Unusual path patterns in Online Help access logs containing '../' or similar traversal sequences
- Multiple failed attempts to access restricted paths via Online Help
Network Indicators:
- HTTP requests to Online Help endpoints with suspicious path parameters
SIEM Query:
source="stonefly_logs" AND (path="*../*" OR path="*..\\*" OR path="*%2e%2e%2f*") AND endpoint="*help*"