CVE-2024-51114

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on affected Digital China Yunke systems via a specific PHP file. It affects Beijing Digital China Yunke Information Technology Co.Ltd version 7.2.6.120. Organizations using this specific version are at risk of complete system compromise.

💻 Affected Systems

Products:
  • Beijing Digital China Yunke Information Technology Co.Ltd
Versions: v.7.2.6.120
Operating Systems: Any OS running the affected software
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the customizable.php file within the web_auth directory. Default installations are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the affected system, enabling data theft, lateral movement, and persistent access.

🟠

Likely Case

Remote code execution leading to web shell deployment, data exfiltration, and potential ransomware deployment.

🟢

If Mitigated

Limited impact with proper network segmentation and web application firewalls blocking malicious requests.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable via web interface, making internet-facing systems immediate targets.
🏢 Internal Only: MEDIUM - Internal systems remain vulnerable to insider threats or compromised internal hosts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

The CWE-77 (Improper Neutralization of Special Elements used in a Command) suggests command injection. Exploitation requires understanding of the vulnerable parameter and payload delivery.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 7.2.6.120 (check vendor for specific fixed version)

Vendor Advisory: Not provided in references

Restart Required: No

Instructions:

1. Contact Digital China Yunke for the official patch. 2. Apply the patch to all affected systems. 3. Remove or restrict access to the vulnerable customizable.php file if patching is delayed.

🔧 Temporary Workarounds

File Access Restriction

all

Block or restrict access to the vulnerable PHP file to prevent exploitation

# Apache: RewriteRule ^/code/function/dpi/web_auth/customizable\.php$ - [F,L]
# Nginx: location ~ /code/function/dpi/web_auth/customizable\.php$ { deny all; }

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from critical assets
  • Deploy web application firewall (WAF) with rules to block command injection patterns targeting the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Check if the file /code/function/dpi/web_auth/customizable.php exists and system version is 7.2.6.120

Check Version:

Check software documentation or admin interface for version information

Verify Fix Applied:

Verify the vulnerable file has been removed/patched and system version is updated beyond 7.2.6.120

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST/GET requests to /code/function/dpi/web_auth/customizable.php
  • System commands execution from web process
  • Web shell file creation in web directories

Network Indicators:

  • HTTP requests containing command injection patterns (|, ;, $, etc.) to the vulnerable endpoint
  • Outbound connections from web server to unknown IPs

SIEM Query:

source="web_logs" AND (url="/code/function/dpi/web_auth/customizable.php" OR cmd="*customizable.php*")

🔗 References

📤 Share & Export