CVE-2024-46648

7.5 HIGH

📋 TL;DR

eNMS versions 4.4.0 through 4.7.1 contain a directory traversal vulnerability in the scan_folder function that allows attackers to read arbitrary files on the server. This affects all eNMS installations running vulnerable versions. Attackers can potentially access sensitive configuration files, credentials, or other system data.

💻 Affected Systems

Products:
  • eNMS
Versions: 4.4.0 to 4.7.1
Operating Systems: Any
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability is in the core scan_folder functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through reading sensitive files like SSH keys, database credentials, or configuration files containing secrets, potentially leading to lateral movement and data exfiltration.

🟠

Likely Case

Unauthorized access to sensitive files containing credentials, configuration data, or user information that could enable further attacks.

🟢

If Mitigated

Limited impact with proper file permissions and network segmentation, potentially only exposing non-sensitive files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Directory traversal vulnerabilities are typically easy to exploit with simple path traversal sequences. The GitHub reference likely contains proof-of-concept details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.7.2 or later

Vendor Advisory: https://github.com/skit-cyber-security/eNMS_vulnerabilities

Restart Required: Yes

Instructions:

1. Backup current eNMS installation and database. 2. Download eNMS version 4.7.2 or later from official source. 3. Replace vulnerable files with patched version. 4. Restart eNMS service. 5. Verify functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Add input validation to reject directory traversal sequences in scan_folder parameter

Modify scan_folder function to validate and sanitize input paths

File Permission Restriction

linux

Restrict eNMS process permissions to limit accessible directories

chmod 750 /path/to/eNMS/data
chown www-data:www-data /path/to/eNMS/data

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block directory traversal patterns
  • Network segmentation to isolate eNMS from sensitive systems and restrict outbound connections

🔍 How to Verify

Check if Vulnerable:

Check if eNMS version is between 4.4.0 and 4.7.1 inclusive. Test scan_folder endpoint with directory traversal payloads like '../../etc/passwd'.

Check Version:

Check eNMS web interface or configuration files for version information

Verify Fix Applied:

After patching, attempt directory traversal attacks against scan_folder endpoint and verify they are blocked. Check that version is 4.7.2 or later.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' or similar traversal patterns to scan_folder endpoint
  • Access to unexpected file paths in application logs

Network Indicators:

  • Unusual file read patterns from eNMS server
  • Requests with path traversal sequences

SIEM Query:

source="eNMS" AND (url="*scan_folder*" AND (url="*../*" OR url="*..\\*" OR url="*%2e%2e%2f*"))

🔗 References

📤 Share & Export