CVE-2024-46080

8.0 HIGH

📋 TL;DR

Scriptcase v9.10.023 and earlier contains a vulnerability in the nm_zip function that allows remote attackers to execute arbitrary code on affected systems. This affects all organizations using vulnerable Scriptcase versions for web application development. Attackers can compromise the entire server through this RCE vulnerability.

💻 Affected Systems

Products:
  • Scriptcase
Versions: v9.10.023 and earlier
Operating Systems: All platforms running Scriptcase
Default Config Vulnerable: ⚠️ Yes
Notes: All Scriptcase installations within the affected version range are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover leading to data theft, ransomware deployment, lateral movement to other systems, and persistent backdoor installation.

🟠

Likely Case

Webshell deployment, credential harvesting, data exfiltration, and use as pivot point for further attacks.

🟢

If Mitigated

Limited impact if proper network segmentation, WAF rules, and least privilege principles are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is publicly documented with technical details, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v9.10.024 or later

Vendor Advisory: https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-rce/

Restart Required: Yes

Instructions:

1. Backup your Scriptcase installation and databases. 2. Download the latest version from the official Scriptcase website. 3. Follow the Scriptcase upgrade documentation to apply the update. 4. Restart the web server and verify functionality.

🔧 Temporary Workarounds

Disable nm_zip function

all

Temporarily disable the vulnerable nm_zip function if immediate patching isn't possible

Modify Scriptcase configuration to remove or restrict nm_zip function access

WAF Rule Implementation

all

Add web application firewall rules to block nm_zip function exploitation attempts

Add WAF rule to block requests containing suspicious nm_zip parameters

🧯 If You Can't Patch

  • Isolate Scriptcase servers from internet access and restrict to internal network only
  • Implement strict network segmentation and monitor all traffic to/from Scriptcase servers

🔍 How to Verify

Check if Vulnerable:

Check Scriptcase version in administration panel or by examining installation files

Check Version:

Check Scriptcase admin panel or look for version information in installation directory

Verify Fix Applied:

Verify version is v9.10.024 or later and test nm_zip function with safe parameters

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to nm_zip endpoints
  • System command execution in web server logs
  • Unexpected process creation from web server user

Network Indicators:

  • Outbound connections from web server to suspicious IPs
  • Unusual data exfiltration patterns
  • Command and control traffic from Scriptcase server

SIEM Query:

source="web_server" AND (uri="*nm_zip*" OR cmd="*system*" OR cmd="*exec*")

🔗 References

📤 Share & Export