CVE-2024-41784

7.5 HIGH

📋 TL;DR

CVE-2024-41784 is a path traversal vulnerability in IBM Sterling Secure Proxy that allows remote attackers to read arbitrary files on the system by sending specially crafted URL requests containing 'dot dot dot' sequences. This affects organizations using vulnerable versions of IBM Sterling Secure Proxy, potentially exposing sensitive configuration files, credentials, or system data.

💻 Affected Systems

Products:
  • IBM Sterling Secure Proxy
Versions: 6.0.0.0 through 6.0.0.3 and 6.1.0.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable by default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through reading sensitive files like configuration files containing credentials, SSH keys, or database passwords, leading to lateral movement and data exfiltration.

🟠

Likely Case

Unauthorized access to sensitive configuration files, potentially exposing credentials, API keys, or other confidential data stored in accessible file paths.

🟢

If Mitigated

Limited impact if file system permissions restrict access to sensitive files and network access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted HTTP requests but does not require authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply interim fix or upgrade to version 6.1.0.1 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7173631

Restart Required: Yes

Instructions:

1. Download the interim fix from IBM Fix Central. 2. Apply the fix according to IBM documentation. 3. Restart the Sterling Secure Proxy service. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to Sterling Secure Proxy to only trusted IP addresses and networks.

Web Application Firewall Rules

all

Configure WAF rules to block requests containing '...' sequences or unusual path traversal patterns.

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to Sterling Secure Proxy instances.
  • Deploy web application firewall with rules specifically blocking path traversal patterns and monitor for exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Check the Sterling Secure Proxy version via administrative interface or configuration files. If version is 6.0.0.0-6.0.0.3 or 6.1.0.0, the system is vulnerable.

Check Version:

Check the version in the Sterling Secure Proxy administrative console or configuration files (specific command varies by deployment).

Verify Fix Applied:

After applying patch, verify the version shows as patched (6.1.0.1 or later) and test with controlled path traversal attempts that should be blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '...' sequences in URLs
  • Unusual file access patterns from web requests
  • Failed attempts to access restricted directories

Network Indicators:

  • HTTP GET requests with unusual path traversal patterns
  • Multiple requests attempting to access system directories

SIEM Query:

web.url:*...* AND (dst.port:443 OR dst.port:80) AND dst.ip:[STERLING_PROXY_IP]

🔗 References

📤 Share & Export