CVE-2024-41770

7.5 HIGH

📋 TL;DR

This vulnerability in IBM Engineering Requirements Management DOORS Next allows remote attackers to download temporary files, potentially exposing sensitive application logic or data. It affects DOORS Next versions 7.0.2, 7.0.3, and 7.1. Organizations using these versions are at risk of information disclosure.

💻 Affected Systems

Products:
  • IBM Engineering Requirements Management DOORS Next
Versions: 7.0.2, 7.0.3, 7.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable unless patched.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could download sensitive configuration files, application source code, or user data, leading to complete system compromise or intellectual property theft.

🟠

Likely Case

Attackers access temporary files containing partial application data, session information, or configuration details that could facilitate further attacks.

🟢

If Mitigated

With proper network segmentation and access controls, attackers cannot reach the vulnerable service, limiting exposure to internal threats only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows remote exploitation without authentication, making it relatively easy to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fix as described in IBM Security Bulletin

Vendor Advisory: https://www.ibm.com/support/pages/node/7184663

Restart Required: Yes

Instructions:

1. Review IBM Security Bulletin. 2. Apply the recommended fix or upgrade to a non-vulnerable version. 3. Restart the DOORS Next service. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to DOORS Next to only trusted internal networks

Access Control Lists

all

Implement strict firewall rules to limit which IP addresses can access the DOORS Next service

🧯 If You Can't Patch

  • Isolate the DOORS Next server from internet access and restrict to internal trusted networks only
  • Implement additional monitoring and alerting for unusual file access patterns

🔍 How to Verify

Check if Vulnerable:

Check the DOORS Next version in the application administration console or configuration files

Check Version:

Check the application version in the DOORS Next administration interface or configuration files

Verify Fix Applied:

Verify the version has been updated to a non-vulnerable release and test that temporary files cannot be accessed remotely

📡 Detection & Monitoring

Log Indicators:

  • Unusual file download patterns from temporary directories
  • Multiple failed attempts to access restricted files

Network Indicators:

  • Unusual HTTP requests to temporary file paths
  • External IP addresses accessing DOORS Next service

SIEM Query:

source="DOORS_Next" AND (url="*/temp/*" OR url="*/tmp/*") AND status=200

🔗 References

📤 Share & Export