CVE-2024-35527

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload malicious .cfm files to FarCry Core framework servers, leading to remote code execution. It affects all FarCry Core installations before version 7.2.14 that have the vulnerable file upload endpoint accessible.

💻 Affected Systems

Products:
  • Daemon PTY Limited FarCry Core framework
Versions: All versions before 7.2.14
Operating Systems: Any OS running FarCry Core
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the /fileupload/upload.cfm endpoint to be accessible and functional.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the web server, allowing data theft, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Web server compromise leading to defacement, data exfiltration, or deployment of web shells for ongoing access.

🟢

If Mitigated

Attack blocked at perimeter with file upload restrictions, resulting in failed exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple file upload exploitation with no authentication required makes this highly exploitable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.2.14

Vendor Advisory: https://bastionsecurity.co.nz/advisories/farcry-core-multiple.html

Restart Required: Yes

Instructions:

1. Backup current installation. 2. Download FarCry Core 7.2.14 or later. 3. Replace vulnerable files with patched versions. 4. Restart web server and application services.

🔧 Temporary Workarounds

Block File Upload Endpoint

all

Restrict access to the vulnerable upload endpoint using web server configuration.

# Apache: RewriteRule ^/fileupload/upload\.cfm$ - [F]
# Nginx: location ~ ^/fileupload/upload\.cfm$ { return 403; }

File Extension Restriction

all

Configure web server to block .cfm file uploads at the vulnerable endpoint.

# Apache: <Location "/fileupload/upload.cfm">
    SetEnvIf Request_URI ".*\.cfm$" block_cfm
    Deny from env=block_cfm
</Location>

🧯 If You Can't Patch

  • Implement strict file upload validation to reject .cfm files and other executable formats.
  • Deploy WAF rules to block malicious file upload attempts targeting the vulnerable endpoint.

🔍 How to Verify

Check if Vulnerable:

Check if FarCry Core version is below 7.2.14 and if /fileupload/upload.cfm endpoint accepts .cfm file uploads.

Check Version:

Check FarCry Core configuration files or admin interface for version information.

Verify Fix Applied:

Verify version is 7.2.14 or higher and test that .cfm file uploads to the endpoint are properly rejected.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /fileupload/upload.cfm with .cfm file uploads
  • Unusual file creation in web directories
  • ColdFusion error logs showing file upload attempts

Network Indicators:

  • POST requests to vulnerable endpoint with file upload content
  • Unusual outbound connections from web server post-upload

SIEM Query:

source="web_server_logs" AND uri="/fileupload/upload.cfm" AND method="POST" AND (file_extension=".cfm" OR content_type="application/x-coldfusion")

🔗 References

📤 Share & Export