CVE-2024-51319

7.3 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to include local files and upload malicious JSP files to achieve remote code execution on Zucchetti Ad Hoc Infinity systems. It affects organizations using version 2.4 of this software, potentially compromising the entire server.

💻 Affected Systems

Products:
  • Zucchetti Ad Hoc Infinity
Versions: 2.4
Operating Systems: Any OS running the software
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access, but default configurations likely vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise leading to data theft, lateral movement, ransomware deployment, and complete system control.

🟠

Likely Case

Unauthorized file access, data exfiltration, and backdoor installation for persistent access.

🟢

If Mitigated

Limited impact with proper authentication controls, but still potential for privilege escalation.

🌐 Internet-Facing: HIGH - If exposed to internet, attackers can exploit after authentication to gain full control.
🏢 Internal Only: HIGH - Even internally, authenticated users can escalate to full system compromise.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authentication but exploitation chain is documented in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 2.4 (check vendor for specific version)

Vendor Advisory: https://members.backbox.org/zucchetti-ad-hoc-infinity-multiple-vulnerabilities/

Restart Required: No

Instructions:

1. Contact Zucchetti for latest patched version. 2. Backup configuration and data. 3. Apply vendor-provided patch. 4. Test functionality before production deployment.

🔧 Temporary Workarounds

Restrict Access to Vulnerable Endpoints

all

Block access to /servlet/Report and /jsp/zimg_upload.jsp via web application firewall or network controls.

# Example WAF rule to block paths
# Block requests containing '/servlet/Report' or '/jsp/zimg_upload.jsp'

Strengthen Authentication

all

Implement multi-factor authentication and strict access controls to limit authenticated users.

# Configure MFA for all user accounts
# Review and restrict user permissions

🧯 If You Can't Patch

  • Isolate the system in a restricted network segment with no internet access.
  • Implement strict file upload validation and monitoring for JSP file uploads.

🔍 How to Verify

Check if Vulnerable:

Check if system runs Zucchetti Ad Hoc Infinity version 2.4 and has /servlet/Report and /jsp/zimg_upload.jsp endpoints accessible.

Check Version:

Check application interface or configuration files for version information.

Verify Fix Applied:

Verify version is updated beyond 2.4 and test that file upload to /jsp/zimg_upload.jsp is properly validated/rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /jsp/zimg_upload.jsp
  • Access to /servlet/Report with file inclusion parameters
  • JSP file execution from unusual locations

Network Indicators:

  • HTTP POST requests to /jsp/zimg_upload.jsp with JSP content
  • HTTP requests to /servlet/Report with file path parameters

SIEM Query:

source="web_logs" AND (uri_path="/jsp/zimg_upload.jsp" OR uri_path="/servlet/Report") AND (file_extension="jsp" OR param_contains="file=")

🔗 References

📤 Share & Export