CVE-2024-41617
📋 TL;DR
Money Manager EX WebApp version 1.2.2 has an access control vulnerability where the redirect_if_not_loggedin function doesn't properly terminate execution after redirecting unauthenticated users. This allows attackers without credentials to upload arbitrary files, potentially leading to remote code execution. All users running the vulnerable version are affected.
💻 Affected Systems
- Money Manager EX WebApp
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete system compromise, data theft, or ransomware deployment
Likely Case
Unauthenticated file upload leading to web shell installation and limited server access
If Mitigated
Attack blocked at network perimeter or detected by file integrity monitoring
🎯 Exploit Status
YouTube demonstration available showing exploitation steps
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.2.3
Vendor Advisory: https://github.com/moneymanagerex/web-money-manager-ex/releases/tag/v1.2.3
Restart Required: No
Instructions:
1. Backup current installation. 2. Download version 1.2.3 from GitHub releases. 3. Replace all files except configuration and database. 4. Verify functions_security.php contains proper exit() after redirect.
🔧 Temporary Workarounds
Disable file upload functionality
allTemporarily disable file upload features in the application
Modify application configuration to disable uploads
Web server file upload restrictions
allConfigure web server to block uploads to vulnerable endpoints
Add location block in nginx or Apache for upload paths
🧯 If You Can't Patch
- Implement strict network access controls to limit application exposure
- Deploy web application firewall with file upload protection rules
🔍 How to Verify
Check if Vulnerable:
Check if functions_security.php lacks exit() after header('Location:') in redirect_if_not_loggedin function
Check Version:
Check application version in admin panel or readme file
Verify Fix Applied:
Verify functions_security.php includes exit() after redirect calls in version 1.2.3
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated POST requests to upload endpoints
- Unexpected file creations in upload directories
Network Indicators:
- Unusual file upload patterns from unauthenticated sources
SIEM Query:
source="web_logs" AND (uri_path="/upload" OR uri_path="*upload*") AND http_status=200 AND auth_status="unauthenticated"