CVE-2024-45077

6.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated low-privileged users to upload restricted file types to IBM Maximo Asset Management by appending a dot to the filename. The exploit specifically affects Windows installations, potentially enabling attackers to upload malicious files that could lead to further system compromise. Organizations running IBM Maximo Asset Management 7.6.1.3 on Windows are affected.

💻 Affected Systems

Products:
  • IBM Maximo Asset Management
Versions: 7.6.1.3
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations due to Windows file system behavior with trailing dots in filenames.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could upload malicious executable files, gain remote code execution, compromise the Maximo server, and potentially pivot to other systems in the network.

🟠

Likely Case

Attackers upload web shells or malicious scripts to establish persistence, exfiltrate data, or use the compromised system as a foothold for lateral movement.

🟢

If Mitigated

With proper file validation and access controls, the impact is limited to unsuccessful upload attempts that generate audit logs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but with low privileges. Exploitation is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply interim fix or upgrade as specified in IBM advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7174819

Restart Required: Yes

Instructions:

1. Review IBM advisory at provided URL
2. Apply the recommended interim fix or security patch
3. Restart Maximo services
4. Verify the fix by testing file upload functionality

🔧 Temporary Workarounds

Implement strict file upload validation

all

Add server-side validation to reject filenames with trailing dots and restrict allowed file extensions

Restrict upload directory permissions

windows

Set strict file system permissions on upload directories to prevent execution of uploaded files

🧯 If You Can't Patch

  • Implement web application firewall rules to block file uploads with suspicious filename patterns
  • Monitor file upload activity and audit logs for unusual patterns or unauthorized file types

🔍 How to Verify

Check if Vulnerable:

Test if authenticated users can upload files with trailing dots in filenames (e.g., 'malicious.php.') and if those files are accepted by the MXAPIASSET API

Check Version:

Check Maximo version through administrative interface or consult system documentation

Verify Fix Applied:

Attempt the same file upload test after applying patches - trailing dot filenames should be rejected

📡 Detection & Monitoring

Log Indicators:

  • File upload attempts with trailing dots in filenames
  • Unusual file types being uploaded to MXAPIASSET endpoints
  • Multiple failed upload attempts followed by successful upload

Network Indicators:

  • POST requests to MXAPIASSET upload endpoints with unusual filenames
  • Traffic patterns indicating file uploads from unexpected sources

SIEM Query:

source="maximo_logs" AND (filename="*." OR file_upload="success" AND file_type NOT IN ("allowed_types"))

🔗 References

📤 Share & Export