CVE-2024-41361

9.8 CRITICAL

📋 TL;DR

CVE-2024-41361 is a critical remote code execution vulnerability in RPi-Jukebox-RFID version 2.7.0 that allows attackers to execute arbitrary code on affected systems via the manageFilesFolders.php file. This affects all users running the vulnerable version of this open-source jukebox software for Raspberry Pi devices.

💻 Affected Systems

Products:
  • RPi-Jukebox-RFID
Versions: Version 2.7.0
Operating Systems: Linux (Raspberry Pi OS)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations of RPi-Jukebox-RFID 2.7.0. The software must be running with the vulnerable PHP file accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to install malware, steal data, pivot to other systems, or use the device as part of a botnet.

🟠

Likely Case

Attacker gains shell access to the Raspberry Pi, potentially modifying audio files, stealing credentials, or disrupting jukebox functionality.

🟢

If Mitigated

Limited impact if system is isolated from internet and other networks with strict access controls.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication, making internet-facing instances extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, the vulnerability requires no authentication and can be exploited by any user with network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub issue contains technical details that could be used to create an exploit. The vulnerability is in file management functionality that doesn't require authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.7.1 or later

Vendor Advisory: https://github.com/MiczFlor/RPi-Jukebox-RFID/issues/2398

Restart Required: No

Instructions:

1. Backup your current installation. 2. Update to version 2.7.1 or later via git pull or fresh installation. 3. Verify the manageFilesFolders.php file has been patched.

🔧 Temporary Workarounds

Disable vulnerable PHP file

linux

Temporarily disable access to the vulnerable manageFilesFolders.php file

sudo mv /var/www/html/htdocs/manageFilesFolders.php /var/www/html/htdocs/manageFilesFolders.php.disabled

Restrict web server access

linux

Configure web server to block access to the vulnerable endpoint

# For Apache: Add to .htaccess
<Files "manageFilesFolders.php">
    Order Allow,Deny
    Deny from all
</Files>
# For Nginx: Add to server block
location ~ /manageFilesFolders\.php$ {
    deny all;
}

🧯 If You Can't Patch

  • Isolate the Raspberry Pi from internet and restrict network access to trusted IPs only
  • Implement strict firewall rules and monitor for suspicious access attempts to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Check if version 2.7.0 is installed and if manageFilesFolders.php exists in htdocs directory

Check Version:

cat /home/pi/RPi-Jukebox-RFID/version.txt

Verify Fix Applied:

Verify version is 2.7.1 or later and check that the vulnerability has been addressed in the manageFilesFolders.php file

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to manageFilesFolders.php
  • Suspicious PHP execution patterns in web server logs
  • Unexpected system commands executed from web user context

Network Indicators:

  • HTTP requests to manageFilesFolders.php with unusual parameters
  • Outbound connections from the Raspberry Pi to unknown destinations

SIEM Query:

source="apache" OR source="nginx" AND (url="*manageFilesFolders.php*" AND (method="POST" OR params="*cmd*" OR params="*system*" OR params="*exec*"))

🔗 References

📤 Share & Export