CVE-2024-46479

9.9 CRITICAL

📋 TL;DR

Venki Supravizio BPM through version 18.0.1 contains an arbitrary file upload vulnerability that allows authenticated attackers to upload malicious files. This can lead to remote code execution on affected systems. Organizations using vulnerable versions of this business process management software are at risk.

💻 Affected Systems

Products:
  • Venki Supravizio BPM
Versions: through 18.0.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to exploit. All deployments with vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the server, data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Attacker uploads web shell or malicious payload to execute arbitrary commands, potentially leading to data theft, service disruption, or ransomware deployment.

🟢

If Mitigated

Limited impact with proper file upload restrictions, input validation, and network segmentation preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained. Public proof-of-concept exists in GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.venki.com.br/ferramenta-bpm/supravizio/

Restart Required: No

Instructions:

1. Contact Venki support for patch information 2. Apply any available security updates 3. Verify the fix by testing file upload functionality

🔧 Temporary Workarounds

Restrict File Upload Types

all

Configure the application to only allow specific safe file extensions and implement server-side validation

Implement Web Application Firewall Rules

all

Deploy WAF rules to block malicious file upload attempts and suspicious HTTP requests

🧯 If You Can't Patch

  • Isolate the Supravizio BPM server in a restricted network segment with minimal access
  • Implement strict access controls and multi-factor authentication for all user accounts

🔍 How to Verify

Check if Vulnerable:

Check if Supravizio BPM version is 18.0.1 or earlier. Test file upload functionality with restricted file types.

Check Version:

Check application version in admin interface or configuration files

Verify Fix Applied:

Attempt to upload files with dangerous extensions (.jsp, .php, .exe) and verify they are rejected with proper validation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads with suspicious extensions
  • Multiple failed upload attempts
  • Successful uploads of executable files

Network Indicators:

  • HTTP POST requests to upload endpoints with unusual file types
  • Traffic to unexpected ports after upload

SIEM Query:

source="supravizio" AND (file_upload="*.jsp" OR file_upload="*.php" OR file_upload="*.exe")

🔗 References

📤 Share & Export