CVE-2024-36528

8.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through insecure deserialization in NukeViet and NukeViet-eGov admin interfaces. Attackers can exploit the /admin/extensions/download.php and /admin/extensions/upload.php endpoints to execute arbitrary code on affected systems. Organizations using NukeViet v4.5 and earlier or NukeViet-eGov v1.2.02 and earlier are affected.

💻 Affected Systems

Products:
  • NukeViet
  • NukeViet-eGov
Versions: NukeViet v4.5 and earlier, NukeViet-eGov v1.2.02 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires access to admin extension endpoints which may be protected by authentication in some configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code, steal data, install malware, or pivot to other systems.

🟠

Likely Case

Unauthorized administrative access leading to website defacement, data theft, or backdoor installation.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to admin endpoints but is straightforward once authenticated or if authentication is bypassed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: NukeViet v4.5.01+, NukeViet-eGov v1.2.03+

Vendor Advisory: https://github.com/nukeviet/nukeviet/releases

Restart Required: No

Instructions:

1. Backup your current installation. 2. Download the latest version from the official repository. 3. Replace affected files with patched versions. 4. Verify functionality.

🔧 Temporary Workarounds

Restrict Admin Access

all

Block access to vulnerable admin endpoints using web server configuration or firewall rules.

# Apache: RewriteRule ^/admin/extensions/(download|upload)\.php$ - [F]
# Nginx: location ~ ^/admin/extensions/(download|upload)\.php$ { deny all; }

Remove Vulnerable Files

linux

Delete or rename the vulnerable PHP files to prevent exploitation.

rm /path/to/admin/extensions/download.php
rm /path/to/admin/extensions/upload.php

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the admin interface.
  • Deploy a web application firewall (WAF) with rules to block deserialization attacks.

🔍 How to Verify

Check if Vulnerable:

Check if /admin/extensions/download.php and /admin/extensions/upload.php exist and review version numbers in configuration files.

Check Version:

grep -r 'define.*NV_VERSION' /path/to/nukeviet/ or check config.php files

Verify Fix Applied:

Verify that vulnerable files have been removed or replaced with patched versions, and test that deserialization attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /admin/extensions/download.php or /admin/extensions/upload.php
  • PHP deserialization errors in web server logs

Network Indicators:

  • HTTP requests containing serialized PHP objects to admin endpoints

SIEM Query:

source="web_logs" AND (url="/admin/extensions/download.php" OR url="/admin/extensions/upload.php") AND (method="POST" OR status>=400)

🔗 References

📤 Share & Export