CVE-2024-4508
📋 TL;DR
This CVE describes a critical OS command injection vulnerability in Ruijie RG-UAC Unified Internet Behavior Management Audit System. Attackers can remotely execute arbitrary commands on affected systems by manipulating parameters in the /view/IPV6/ipv6StaticRoute/static_route_edit_ipv6.php file. Organizations using Ruijie RG-UAC systems up to April 28, 2024 are affected.
💻 Affected Systems
- Ruijie RG-UAC Unified Internet Behavior Management Audit System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise allowing attackers to execute arbitrary commands with system privileges, potentially leading to data theft, ransomware deployment, or complete system takeover.
Likely Case
Remote code execution allowing attackers to install backdoors, pivot to internal networks, or disrupt network operations.
If Mitigated
Limited impact if proper network segmentation, WAF rules, and input validation are in place to block malicious requests.
🎯 Exploit Status
Exploit details are publicly available in GitHub repositories. The vulnerability allows remote exploitation without authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch available. Vendor was contacted but did not respond. Consider workarounds or system replacement.
🔧 Temporary Workarounds
Block Access to Vulnerable Endpoint
allRestrict access to the vulnerable PHP file using web server configuration or network controls
# Apache: RewriteRule ^/view/IPV6/ipv6StaticRoute/static_route_edit_ipv6\.php$ - [F]
# Nginx: location ~ /view/IPV6/ipv6StaticRoute/static_route_edit_ipv6\.php$ { deny all; }
Implement WAF Rules
allDeploy web application firewall rules to detect and block command injection attempts
# Example ModSecurity rule: SecRule ARGS "[;|&`$()]" "id:1001,phase:2,deny,msg:'Command Injection Attempt'"
# Cloudflare WAF: Enable command injection protection rules
🧯 If You Can't Patch
- Isolate affected systems in a separate network segment with strict access controls
- Implement network monitoring and IDS/IPS rules to detect exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check if the file /view/IPV6/ipv6StaticRoute/static_route_edit_ipv6.php exists and is accessible. Test with controlled command injection payloads in a safe environment.
Check Version:
Check system version through web interface or administrative console. No specific CLI command provided by vendor.
Verify Fix Applied:
Verify workarounds by attempting to access the vulnerable endpoint and confirming it's blocked. Test with command injection payloads to ensure they're rejected.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /view/IPV6/ipv6StaticRoute/static_route_edit_ipv6.php with shell metacharacters
- System logs showing unexpected command execution
- Web server logs with command injection patterns (;, |, &, `, $())
Network Indicators:
- HTTP requests containing shell commands in parameters
- Outbound connections from the Ruijie system to unexpected destinations
SIEM Query:
source="web_server" AND uri="/view/IPV6/ipv6StaticRoute/static_route_edit_ipv6.php" AND (request_body CONTAINS ";" OR request_body CONTAINS "|" OR request_body CONTAINS "&" OR request_body CONTAINS "`" OR request_body CONTAINS "$()")
🔗 References
- https://github.com/h0e4a0r1t/-2x3J-1rPc-1-0-/blob/main/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-static_route_edit_ipv6.php.pdf
- https://vuldb.com/?ctiid.263112
- https://vuldb.com/?id.263112
- https://vuldb.com/?submit.323818
- https://github.com/h0e4a0r1t/-2x3J-1rPc-1-0-/blob/main/Ruijie%20RG-UAC%20Unified%20Internet%20Behavior%20Management%20Audit%20System%20Backend%20RCE%20Vulnerability-static_route_edit_ipv6.php.pdf
- https://vuldb.com/?ctiid.263112
- https://vuldb.com/?id.263112
- https://vuldb.com/?submit.323818