CVE-2024-43395

8.2 HIGH

📋 TL;DR

CVE-2024-43395 is a path traversal vulnerability in CraftOS-PC 2 that allows attackers to escape the designated computer folder and access arbitrary files on Windows systems by obfuscating directory traversal sequences. This affects all Windows users running CraftOS-PC 2 versions before 2.8.3. The vulnerability bypasses internal security checks designed to prevent parent directory access.

💻 Affected Systems

Products:
  • CraftOS-PC 2
Versions: All versions before 2.8.3
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations; Linux/macOS versions are not vulnerable due to different path handling.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through arbitrary file read/write, potentially leading to credential theft, data exfiltration, or malware installation.

🟠

Likely Case

Unauthorized access to sensitive files outside the sandboxed environment, potentially exposing user data, configuration files, or system information.

🟢

If Mitigated

Limited impact if proper file system permissions restrict the CraftOS-PC process, though the vulnerability still bypasses application-level controls.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction within the CraftOS-PC environment but uses simple path obfuscation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.8.3

Vendor Advisory: https://github.com/MCJack123/craftos2/security/advisories/GHSA-hr3w-wc83-6923

Restart Required: Yes

Instructions:

1. Download CraftOS-PC 2.8.3 or later from official sources. 2. Uninstall previous version. 3. Install new version. 4. Restart the application.

🔧 Temporary Workarounds

Restrict File System Access

windows

Run CraftOS-PC with restricted permissions or in a sandboxed environment

Run as limited user account without administrative privileges

Use Alternative Platform

all

Run CraftOS-PC on Linux or macOS where the vulnerability does not exist

🧯 If You Can't Patch

  • Run CraftOS-PC in a virtual machine or container with limited host file system access
  • Implement strict file system auditing and monitoring for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check if CraftOS-PC version is below 2.8.3 on Windows systems

Check Version:

craftos2 --version or check About dialog in application

Verify Fix Applied:

Confirm version is 2.8.3 or higher and test path traversal attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns outside designated computer folder
  • Failed path traversal attempts in application logs

Network Indicators:

  • None - this is a local file system vulnerability

SIEM Query:

Process execution: craftos2.exe AND File access: patterns containing '..' or path obfuscation attempts

🔗 References

📤 Share & Export