CVE-2024-46489

8.8 HIGH

📋 TL;DR

A remote command execution vulnerability in promptr v6.0.7 allows attackers to execute arbitrary commands on affected systems by sending specially crafted URLs. This affects all systems running promptr v6.0.7 that are exposed to network access. Attackers can potentially gain full control of vulnerable systems.

💻 Affected Systems

Products:
  • promptr
Versions: v6.0.7
Operating Systems: All platforms running promptr
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of promptr v6.0.7 are vulnerable regardless of configuration. The vulnerability is in the core URL handling functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands with the privileges of the promptr process, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Attackers gain shell access to the vulnerable system, allowing them to install malware, exfiltrate data, or use the system as a foothold for further attacks.

🟢

If Mitigated

Limited impact due to network segmentation, minimal privileges for the promptr process, and proper monitoring detecting exploitation attempts.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable via crafted URLs, making internet-facing instances particularly vulnerable to widespread scanning and exploitation.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable to insider threats or attackers who have gained initial access to the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub reference contains technical details that could be used to create working exploits. The vulnerability requires no authentication and has low technical barriers to exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check promptr vendor for security updates. 2. If patch is available, download and apply it. 3. Restart the promptr service. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Network Isolation

linux

Restrict network access to promptr instances using firewall rules

iptables -A INPUT -p tcp --dport [promptr_port] -s [allowed_ips] -j ACCEPT
iptables -A INPUT -p tcp --dport [promptr_port] -j DROP

Process Sandboxing

linux

Run promptr with minimal privileges using containerization or user restrictions

docker run --read-only --cap-drop=ALL --user nobody promptr:6.0.7

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the promptr service
  • Monitor for suspicious URL patterns and command execution attempts in logs

🔍 How to Verify

Check if Vulnerable:

Check if promptr version is 6.0.7. If the service accepts URLs and you can confirm command injection via URL parameters, it is vulnerable.

Check Version:

Check promptr configuration files or run: ps aux | grep promptr | grep -v grep

Verify Fix Applied:

Test with known exploit payloads to confirm they no longer execute commands. Verify the version has been updated from 6.0.7.

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL patterns with shell metacharacters
  • Unexpected process spawns from promptr
  • Failed command execution attempts in logs

Network Indicators:

  • HTTP requests with suspicious parameters containing shell commands
  • Outbound connections from promptr to unexpected destinations

SIEM Query:

source="promptr.log" AND (url="*;*" OR url="*|*" OR url="*`*" OR url="*$(*")

🔗 References

📤 Share & Export