CVE-2024-34832

9.8 CRITICAL

📋 TL;DR

This CVE describes a directory traversal vulnerability in CubeCart that allows attackers to upload malicious files to arbitrary locations on the server. Attackers can exploit this via crafted _g and node parameters to achieve remote code execution. All CubeCart installations up to version 6.5.5 are affected.

💻 Affected Systems

Products:
  • CubeCart
Versions: v6.5.5 and all earlier versions
Operating Systems: Any OS running CubeCart (typically Linux/Windows web servers)
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, ransomware deployment, or use as a pivot point for lateral movement within the network.

🟠

Likely Case

Webshell installation leading to persistent backdoor access, data exfiltration, and potential credential harvesting.

🟢

If Mitigated

File upload attempts blocked at WAF level, with no successful exploitation despite attempts.

🌐 Internet-Facing: HIGH - Web applications are directly accessible and vulnerable to unauthenticated attacks.
🏢 Internal Only: MEDIUM - Internal applications could be exploited by compromised internal users or through phishing attacks.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code exists on GitHub. The vulnerability requires minimal technical skill to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: CubeCart 6.5.6 or later

Vendor Advisory: https://github.com/cubecart/v6/releases

Restart Required: No

Instructions:

1. Backup your CubeCart installation and database. 2. Download the latest version from the official CubeCart website. 3. Replace all files except configuration files and uploads directory. 4. Run the upgrade script if provided. 5. Verify the installation works correctly.

🔧 Temporary Workarounds

WAF Rule for Path Traversal

all

Block requests containing directory traversal sequences in parameters

ModSecurity rule: SecRule ARGS "\.\./" "phase:1,deny,id:1001,msg:'Path Traversal Attempt'"

File Upload Restriction

all

Restrict file upload functionality to authenticated users only

Add authentication check before processing _g and node parameters

🧯 If You Can't Patch

  • Implement strict WAF rules to block directory traversal patterns in all request parameters
  • Disable file upload functionality entirely if not required for business operations

🔍 How to Verify

Check if Vulnerable:

Check CubeCart version in admin panel or examine /includes/global.inc.php for version information

Check Version:

grep "define('CC_VERSION'" /path/to/cubecart/includes/global.inc.php

Verify Fix Applied:

After patching, attempt to upload a test file with traversal sequences in _g parameter - should be rejected

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing "../" or "..\" in _g or node parameters
  • Unexpected file creation in webroot or system directories
  • Webshell access patterns in access logs

Network Indicators:

  • Unusual outbound connections from web server
  • Large file uploads to unexpected paths

SIEM Query:

source="web_logs" AND (uri="*_g=*../*" OR uri="*node=*../*")

🔗 References

📤 Share & Export