CVE-2024-41163
📋 TL;DR
An unauthenticated directory traversal vulnerability in Veertu Anka Build's archive functionality allows attackers to access sensitive files outside intended directories. This affects Anka Build 1.42.0 installations, potentially exposing configuration files, credentials, or other sensitive data.
💻 Affected Systems
- Veertu Anka Build
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through exposure of credentials, configuration files, or sensitive data leading to lateral movement or data exfiltration.
Likely Case
Disclosure of sensitive configuration files, environment variables, or credentials stored in accessible directories.
If Mitigated
Limited impact if proper network segmentation and access controls prevent unauthenticated access to the vulnerable endpoint.
🎯 Exploit Status
Exploitation requires sending specially crafted HTTP requests to the vulnerable endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.42.1 or later
Vendor Advisory: https://veertu.com/security-advisories/
Restart Required: Yes
Instructions:
1. Download latest version from Veertu website. 2. Stop Anka Build service. 3. Install updated version. 4. Restart service.
🔧 Temporary Workarounds
Network Access Restriction
allRestrict network access to Anka Build HTTP endpoints using firewall rules.
sudo ufw deny from any to any port 8080
iptables -A INPUT -p tcp --dport 8080 -j DROP
Reverse Proxy with Path Validation
allPlace behind reverse proxy that validates and sanitizes URL paths.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Anka Build from untrusted networks.
- Deploy web application firewall (WAF) with directory traversal protection rules.
🔍 How to Verify
Check if Vulnerable:
Check if running Anka Build 1.42.0 via version command or service status.
Check Version:
anka version | grep Build
Verify Fix Applied:
Verify version is 1.42.1 or later and test archive endpoint with traversal attempts.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests with ../ sequences to archive endpoints
- Unusual file access patterns from web logs
Network Indicators:
- HTTP requests containing directory traversal sequences (../, ..\) to port 8080
SIEM Query:
source="anka.log" AND "../" AND "archive"