CVE-2024-39914

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on FOG Project servers via command injection in the filename parameter. It affects all FOG Project installations prior to version 1.5.10.34. Attackers can potentially gain full control of affected systems.

💻 Affected Systems

Products:
  • FOG Project
Versions: All versions prior to 1.5.10.34
Operating Systems: Linux (primary), potentially any OS running FOG
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface component of FOG Project. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data theft, ransomware deployment, lateral movement within the network, and persistent backdoor installation.

🟠

Likely Case

Remote code execution allowing attackers to run arbitrary commands, potentially leading to data exfiltration, service disruption, or cryptocurrency mining.

🟢

If Mitigated

Limited impact if proper network segmentation, web application firewalls, and input validation are in place, though risk remains significant.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable via web interface and requires no authentication, making internet-facing instances extremely vulnerable.
🏢 Internal Only: HIGH - Even internal instances are at high risk due to the unauthenticated nature and ease of exploitation.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in a web endpoint with no authentication required. Exploitation is straightforward with publicly available details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.10.34

Vendor Advisory: https://github.com/FOGProject/fogproject/security/advisories/GHSA-7h44-6vq6-cq8j

Restart Required: Yes

Instructions:

1. Backup your FOG configuration and database. 2. Update FOG Project to version 1.5.10.34 or later using your package manager or manual installation. 3. Restart the FOG services and web server. 4. Verify the update was successful.

🔧 Temporary Workarounds

Web Application Firewall Rule

linux

Block or sanitize requests containing shell metacharacters in the filename parameter

# Example mod_security rule: SecRule ARGS:filename "[;|&`$()]" "deny,status:403"

Access Restriction

linux

Restrict access to /fog/management/export.php endpoint to trusted IP addresses only

# Apache: <Location "/fog/management/export.php">
    Require ip 192.168.1.0/24
</Location>
# Nginx: location /fog/management/export.php {
    allow 192.168.1.0/24;
    deny all;
}

🧯 If You Can't Patch

  • Disable or block access to the /fog/management/export.php endpoint completely
  • Implement strict network segmentation to isolate FOG servers from critical infrastructure

🔍 How to Verify

Check if Vulnerable:

Check if FOG version is below 1.5.10.34 by examining the web interface footer or running: cat /var/www/html/fog/version.php | grep FOG_VERSION

Check Version:

grep "define.*FOG_VERSION" /var/www/html/fog/version.php

Verify Fix Applied:

Verify version is 1.5.10.34 or higher and test that command injection attempts are properly sanitized or blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /fog/management/export.php with shell metacharacters in parameters
  • System logs showing unexpected command execution from web server user

Network Indicators:

  • HTTP requests to export.php with suspicious filename parameters containing ;, |, &, `, $, or ()
  • Outbound connections from FOG server to unexpected destinations

SIEM Query:

source="web_access.log" AND uri_path="/fog/management/export.php" AND (filename="*;*" OR filename="*|*" OR filename="*`*" OR filename="*$(*)")

🔗 References

📤 Share & Export