CVE-2024-38909

9.8 CRITICAL

📋 TL;DR

CVE-2024-38909 is an incorrect access control vulnerability in elFinder 2.1.64 that allows attackers to copy files with unauthorized extensions between server directories. This can lead to exposure of sensitive files, remote code execution, and other security breaches. Anyone using the vulnerable version of elFinder is affected.

💻 Affected Systems

Products:
  • Studio 42 elFinder
Versions: 2.1.64
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web applications using elFinder for file management. The vulnerability exists in the file copying functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise through remote code execution, allowing attackers to steal sensitive data, install malware, or pivot to other systems.

🟠

Likely Case

Unauthorized access to sensitive files containing secrets, configuration data, or user information, potentially leading to data breaches.

🟢

If Mitigated

Limited impact with proper file permission controls and extension restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access to the elFinder interface but doesn't require full authentication. Public proof-of-concept code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.65 or later

Vendor Advisory: http://elfinder.com

Restart Required: No

Instructions:

1. Backup your current elFinder installation. 2. Download the latest version from the official repository. 3. Replace the vulnerable files with the patched version. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict File Extensions

all

Configure elFinder to only allow specific file extensions for copying operations

Modify elFinder configuration to set 'uploadAllow' and 'uploadDeny' parameters appropriately

Disable Copy Functionality

all

Temporarily disable file copying features in elFinder

Set 'disabled' => array('copy') in elFinder configuration

🧯 If You Can't Patch

  • Implement strict file permission controls on server directories
  • Deploy web application firewall rules to block suspicious file operations

🔍 How to Verify

Check if Vulnerable:

Check if elFinder version is 2.1.64 by examining the source code or configuration files

Check Version:

grep -r '2\.1\.64' /path/to/elfinder/ or check elFinder configuration files

Verify Fix Applied:

Verify the version has been updated to 2.1.65 or later and test file copying with unauthorized extensions

📡 Detection & Monitoring

Log Indicators:

  • Unusual file copy operations with unexpected extensions
  • Multiple failed copy attempts with different file types

Network Indicators:

  • HTTP POST requests to elFinder copy endpoints with unusual file extensions

SIEM Query:

source="web_server" AND (uri="/elfinder/php/connector.php" OR uri="/elfinder/php/elFinder.class.php") AND (method="POST" OR method="PUT") AND (file_extension="php" OR file_extension="exe" OR file_extension="sh")

🔗 References

📤 Share & Export