CVE-2024-32491

9.8 CRITICAL

📋 TL;DR

This vulnerability allows authenticated users in Znuny and Znuny LTS to upload files to arbitrary writable locations via path traversal in manipulated AJAX requests. If the uploaded location is publicly accessible through the web server, this can lead to arbitrary code execution. Affected systems include Znuny LTS 6.0.31 through 6.5.7 and Znuny 7.0.1 through 7.0.16.

💻 Affected Systems

Products:
  • Znuny
  • Znuny LTS
Versions: Znuny LTS 6.0.31 through 6.5.7, Znuny 7.0.1 through 7.0.16
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; exploitation depends on writable locations being web-accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, and lateral movement within the network.

🟠

Likely Case

Authenticated attackers upload malicious files to web-accessible directories, enabling web shell deployment and subsequent command execution.

🟢

If Mitigated

Limited to authenticated user privilege escalation and file system manipulation without code execution if upload locations aren't web-accessible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but uses simple path traversal techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Znuny LTS 6.5.8, Znuny 7.0.17

Vendor Advisory: https://www.znuny.org/en/advisories/zsa-2024-01

Restart Required: Yes

Instructions:

1. Backup your Znuny installation and database. 2. Download the patched version from the official Znuny website. 3. Follow the official upgrade instructions for your version. 4. Restart the Znuny service.

🔧 Temporary Workarounds

Restrict file upload permissions

all

Configure web server to deny public access to upload directories and restrict writable locations.

# Configure appropriate file permissions for upload directories
# Example: chmod 750 /path/to/upload/dir
# Configure web server (Apache/Nginx) to deny access to sensitive directories

Implement input validation

all

Add server-side validation to reject file upload requests with path traversal sequences.

# Implement validation in relevant upload handlers to reject paths containing '../' or similar traversal sequences

🧯 If You Can't Patch

  • Restrict authenticated user access to minimum required privileges
  • Implement web application firewall rules to block requests with path traversal patterns

🔍 How to Verify

Check if Vulnerable:

Check your Znuny version against affected ranges: Znuny LTS 6.0.31-6.5.7 or Znuny 7.0.1-7.0.16

Check Version:

Check the Znuny admin interface or examine the RELEASE file in the installation directory

Verify Fix Applied:

Verify version is updated to Znuny LTS 6.5.8+ or Znuny 7.0.17+

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload patterns
  • AJAX requests with path traversal sequences
  • File writes to unexpected directories

Network Indicators:

  • HTTP POST requests to upload endpoints with suspicious path parameters

SIEM Query:

source="znuny_logs" AND (http_method="POST" AND uri="*upload*" AND (param="*../*" OR param="*..\\*"))

🔗 References

📤 Share & Export