CVE-2024-44599

8.3 HIGH

📋 TL;DR

FNT Command 13.4.0 contains a directory traversal vulnerability (CWE-434) that allows attackers to access files outside the intended directory. This affects systems running FNT Command 13.4.0 without proper input validation. Attackers could potentially read sensitive files on the server.

💻 Affected Systems

Products:
  • FNT Command
Versions: 13.4.0
Operating Systems: All platforms running FNT Command
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of FNT Command 13.4.0 are vulnerable unless specifically hardened against directory traversal attacks.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through reading sensitive configuration files, credentials, or deploying malicious payloads to execute arbitrary code.

🟠

Likely Case

Unauthorized access to sensitive files containing configuration data, credentials, or proprietary information.

🟢

If Mitigated

Limited impact with proper network segmentation, file system permissions, and input validation controls in place.

🌐 Internet-Facing: HIGH - Directory traversal vulnerabilities on internet-facing systems allow remote attackers to access sensitive files without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this to escalate privileges or access sensitive data.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub gist provides technical details that could be used to create exploits. Directory traversal vulnerabilities are typically easy to exploit with basic HTTP requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://fnt.com

Restart Required: No

Instructions:

1. Contact FNT Software for patch availability. 2. Check vendor website for security updates. 3. Apply any available patches following vendor instructions.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement web application firewall or input validation to block directory traversal sequences

Configure WAF rules to block requests containing '../', '..\', or similar traversal patterns

File System Permissions

linux

Restrict file system permissions for the web application user

chmod 750 /path/to/webroot
chown www-data:www-data /path/to/webroot

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FNT Command from sensitive systems
  • Deploy web application firewall with directory traversal protection rules

🔍 How to Verify

Check if Vulnerable:

Test by attempting to access files outside webroot using traversal sequences like '../../etc/passwd' in URL parameters

Check Version:

Check FNT Command version in application interface or configuration files

Verify Fix Applied:

Retest traversal attempts after applying controls; successful attempts should return access denied errors

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../', '..\', or similar patterns
  • Access to files outside expected web directories
  • Failed file access attempts with traversal sequences

Network Indicators:

  • Unusual file paths in HTTP requests
  • Requests for system files from web application

SIEM Query:

source="web_logs" AND (uri="*../*" OR uri="*..\\*" OR uri="*%2e%2e%2f*")

🔗 References

📤 Share & Export