CVE-2024-44759

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to download arbitrary files from NUS-M9 ERP Management Software v3.0.0 servers by exploiting an insecure file download endpoint. Attackers can access sensitive system files, configuration data, and potentially credentials. Organizations running this specific ERP software version are affected.

💻 Affected Systems

Products:
  • NUS-M9 ERP Management Software
Versions: v3.0.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation of version 3.0.0. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through retrieval of sensitive files like configuration files, database credentials, SSH keys, or system files leading to lateral movement and data exfiltration.

🟠

Likely Case

Unauthorized access to sensitive business data, configuration files, and potentially user information stored on the server.

🟢

If Mitigated

Limited impact if proper network segmentation, file system permissions, and access controls prevent access to critical system files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit requires crafting a simple HTTP request to the vulnerable endpoint. Public proof-of-concept code is available in the referenced GitHub repositories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch is available. Check with the vendor for updates or consider workarounds.

🔧 Temporary Workarounds

Block Vulnerable Endpoint

all

Use web application firewall or reverse proxy to block requests to /Doc/DownloadFile endpoint

# Example nginx location block
location /Doc/DownloadFile { deny all; }
# Example Apache .htaccess
RedirectMatch 403 ^/Doc/DownloadFile

Restrict File System Access

all

Configure the application to run with minimal file system permissions

# Linux: Run as non-root user with restricted home directory
chown -R appuser:appgroup /path/to/m9erp
# Windows: Configure application pool identity with limited privileges

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the ERP system from sensitive networks
  • Deploy web application firewall with rules to detect and block file download exploitation patterns

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://[target]/Doc/DownloadFile?file=../../etc/passwd (Linux) or similar path traversal to test for arbitrary file download.

Check Version:

Check application version in web interface or configuration files. Typically found in /about or /version endpoints.

Verify Fix Applied:

Test the same exploitation attempt after applying workarounds to confirm the endpoint is blocked or restricted.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /Doc/DownloadFile with path traversal patterns (../)
  • Unusual file access patterns from web application user
  • Large number of download requests from single IP

Network Indicators:

  • HTTP GET requests containing ../ patterns in URL parameters
  • Unusual outbound traffic patterns after exploitation

SIEM Query:

source="web_logs" AND url="*Doc/DownloadFile*" AND (url="*../*" OR url="*..\\*" OR url="*%2e%2e%2f*")

🔗 References

📤 Share & Export