CVE-2024-41617

9.8 CRITICAL

📋 TL;DR

Money Manager EX WebApp version 1.2.2 has an access control vulnerability where the redirect_if_not_loggedin function doesn't properly terminate execution after redirecting unauthenticated users. This allows attackers without credentials to upload arbitrary files, potentially leading to remote code execution. All users running the vulnerable version are affected.

💻 Affected Systems

Products:
  • Money Manager EX WebApp
Versions: 1.2.2 and earlier
Operating Systems: All platforms running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires file upload functionality to be accessible

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment

🟠

Likely Case

Unauthenticated file upload leading to web shell installation and limited server access

🟢

If Mitigated

Attack blocked at network perimeter or detected by file integrity monitoring

🌐 Internet-Facing: HIGH - Unauthenticated exploit allows direct internet-based attacks
🏢 Internal Only: HIGH - Internal attackers can exploit without credentials

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

YouTube demonstration available showing exploitation steps

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.3

Vendor Advisory: https://github.com/moneymanagerex/web-money-manager-ex/releases/tag/v1.2.3

Restart Required: No

Instructions:

1. Backup current installation. 2. Download version 1.2.3 from GitHub releases. 3. Replace all files except configuration and database. 4. Verify functions_security.php contains proper exit() after redirect.

🔧 Temporary Workarounds

Disable file upload functionality

all

Temporarily disable file upload features in the application

Modify application configuration to disable uploads

Web server file upload restrictions

all

Configure web server to block uploads to vulnerable endpoints

Add location block in nginx or Apache for upload paths

🧯 If You Can't Patch

  • Implement strict network access controls to limit application exposure
  • Deploy web application firewall with file upload protection rules

🔍 How to Verify

Check if Vulnerable:

Check if functions_security.php lacks exit() after header('Location:') in redirect_if_not_loggedin function

Check Version:

Check application version in admin panel or readme file

Verify Fix Applied:

Verify functions_security.php includes exit() after redirect calls in version 1.2.3

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated POST requests to upload endpoints
  • Unexpected file creations in upload directories

Network Indicators:

  • Unusual file upload patterns from unauthenticated sources

SIEM Query:

source="web_logs" AND (uri_path="/upload" OR uri_path="*upload*") AND http_status=200 AND auth_status="unauthenticated"

🔗 References

📤 Share & Export