CVE-2024-46506

10.0 CRITICAL

📋 TL;DR

CVE-2024-46506 is an unauthenticated remote command injection vulnerability in NetAlertX that allows attackers to execute arbitrary commands on affected systems. This affects all NetAlertX installations running versions 23.01.14 through 24.x before 24.10.12. Attackers can exploit this without any authentication by sending specially crafted requests to the vulnerable settings.php endpoint.

💻 Affected Systems

Products:
  • NetAlertX
Versions: 23.01.14 through 24.x before 24.10.12
Operating Systems: Linux, Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The vulnerability exists in the settings.php file which lacks authentication checks for the savesettings function.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data theft, ransomware deployment, lateral movement within networks, and persistent backdoor installation.

🟠

Likely Case

Remote code execution allowing attackers to install malware, steal sensitive data, or use the system as a foothold for further attacks.

🟢

If Mitigated

Limited impact if proper network segmentation, WAF rules, and authentication requirements are in place to block unauthenticated access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Actively exploited in the wild since May 2025. Exploitation requires sending HTTP POST requests to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.10.12

Vendor Advisory: https://github.com/NetAlertX/NetAlertX/releases/tag/v24.10.12

Restart Required: No

Instructions:

1. Backup current configuration. 2. Download NetAlertX version 24.10.12 or later from official repository. 3. Replace existing installation files with patched version. 4. Verify authentication is now required for settings.php savesettings function.

🔧 Temporary Workarounds

Block Unauthenticated Access to settings.php

all

Configure web server to require authentication for settings.php endpoint

# Apache: Add to .htaccess or virtual host config
<Files "settings.php">
    AuthType Basic
    AuthName "Restricted Access"
    AuthUserFile /path/to/.htpasswd
    Require valid-user
</Files>
# Nginx: Add to server block
location ~ /settings\.php$ {
    auth_basic "Restricted Access";
    auth_basic_user_file /path/to/.htpasswd;
}

Web Application Firewall Rule

all

Block requests to settings.php with savesettings parameter from unauthenticated sources

# Example ModSecurity rule
SecRule REQUEST_URI "@contains settings.php" \
    "id:1001,phase:1,deny,status:403,msg:'Blocking unauthenticated access to settings.php'"

🧯 If You Can't Patch

  • Immediately restrict network access to NetAlertX instances using firewall rules to allow only trusted IP addresses.
  • Implement strong authentication at the web server level for all NetAlertX endpoints, particularly settings.php.

🔍 How to Verify

Check if Vulnerable:

Check if NetAlertX version is between 23.01.14 and 24.10.11. Test by sending unauthenticated POST request to /settings.php with function=savesettings parameter.

Check Version:

Check NetAlertX web interface dashboard or examine version files in installation directory.

Verify Fix Applied:

Verify version is 24.10.12 or later. Test that unauthenticated POST requests to settings.php with savesettings parameter now return authentication error.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to settings.php with function=savesettings parameter from unauthenticated sources
  • Unusual command execution patterns in system logs following settings.php access
  • Failed authentication attempts to settings.php endpoint

Network Indicators:

  • Unusual outbound connections from NetAlertX server following settings.php access
  • HTTP POST requests to settings.php from external IP addresses

SIEM Query:

source="web_server_logs" AND uri="/settings.php" AND method="POST" AND (user_agent="*" OR auth="-")

🔗 References

📤 Share & Export