CVE-2024-34060

8.8 HIGH

📋 TL;DR

CVE-2024-34060 is an arbitrary file write vulnerability in IrisEVTXModule that allows attackers to write malicious files to the server during EVTX file uploads. When combined with Server Side Template Injection (SSTI), this can lead to remote code execution. Organizations using IrisEVTXModule versions before 1.0.0 are affected.

💻 Affected Systems

Products:
  • IrisEVTXModule
  • iris-evtx-module
  • Evtx2Splunk with Iris integration
Versions: All versions before 1.0.0
Operating Systems: Any OS running IrisEVTXModule
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the EVTX file upload pipeline in iris-web applications. Requires the module to be enabled and processing EVTX files.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Arbitrary file write enabling file manipulation, potential data corruption, and preparation for further exploitation.

🟢

If Mitigated

Limited to file system manipulation without RCE if SSTI is properly mitigated or disabled.

🌐 Internet-Facing: HIGH - The vulnerability affects file upload functionality which is often internet-facing in web applications.
🏢 Internal Only: MEDIUM - Internal users could exploit this, but external attackers pose greater risk.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires chaining with SSTI for RCE, but arbitrary file write alone is simpler. No public exploit code identified yet.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.0

Vendor Advisory: https://github.com/dfir-iris/iris-evtx-module/security/advisories/GHSA-9rw6-5q9j-82fm

Restart Required: Yes

Instructions:

1. Stop iris-web service. 2. Update iris-evtx-module to version 1.0.0 via pip: 'pip install iris-evtx-module==1.0.0'. 3. Restart iris-web service. 4. Verify the fix by checking module version.

🔧 Temporary Workarounds

Disable EVTX upload functionality

all

Temporarily disable the vulnerable EVTX file upload pipeline in iris-web configuration

Edit iris-web configuration to disable iris-evtx-module or EVTX processing

Implement file upload restrictions

all

Configure web application firewall or reverse proxy to restrict EVTX file uploads

🧯 If You Can't Patch

  • Implement strict file upload validation and sanitization at the application layer
  • Deploy network segmentation to isolate iris-web instances from critical systems

🔍 How to Verify

Check if Vulnerable:

Check iris-evtx-module version: 'pip show iris-evtx-module' and verify if version is <1.0.0

Check Version:

pip show iris-evtx-module | grep Version

Verify Fix Applied:

Confirm version is 1.0.0 or higher: 'pip show iris-evtx-module | grep Version'

📡 Detection & Monitoring

Log Indicators:

  • Unusual EVTX file uploads with suspicious filenames
  • File write operations to unexpected locations
  • SSTI-related error messages in application logs

Network Indicators:

  • Multiple EVTX file upload attempts
  • Unusual outbound connections from iris-web server

SIEM Query:

source="iris-web" AND (event="file_upload" OR event="evtx_processing") AND filename CONTAINS ".." OR filename CONTAINS "/"

🔗 References

📤 Share & Export