CVE-2024-51366

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload malicious .conf files to OmegaT's Roaming\Omega directory, leading to arbitrary code execution. It affects OmegaT v6.0.1 users who process untrusted files. Attackers can gain full control of affected systems.

💻 Affected Systems

Products:
  • OmegaT
Versions: v6.0.1
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default configuration when processing untrusted .conf files.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining administrative privileges, data theft, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Local privilege escalation leading to user account compromise, data exfiltration, and lateral movement within the network.

🟢

If Mitigated

Limited impact if file uploads are restricted to trusted sources and proper file validation is implemented.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Proof of concept available on GitHub. Exploitation requires user interaction to upload malicious file.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://omegat.org/

Restart Required: No

Instructions:

1. Check OmegaT website for security updates. 2. If patch available, download and install. 3. Verify installation by checking version.

🔧 Temporary Workarounds

Restrict file upload permissions

all

Set strict permissions on Roaming\Omega directory to prevent unauthorized file uploads.

chmod 700 ~/.omegat/ (Linux/macOS)
icacls "%APPDATA%\OmegaT" /deny Everyone:(OI)(CI)F (Windows)

Disable .conf file processing

all

Configure OmegaT to reject .conf files or process them in sandboxed environment.

🧯 If You Can't Patch

  • Isolate OmegaT systems from critical networks and internet
  • Implement application allowlisting to prevent execution of unauthorized files

🔍 How to Verify

Check if Vulnerable:

Check OmegaT version in Help > About. If version is 6.0.1, system is vulnerable.

Check Version:

omegat --version (Linux/macOS) or check Help > About menu (Windows)

Verify Fix Applied:

Verify version is updated beyond 6.0.1 and test with safe .conf file upload.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized file writes to Roaming\Omega directory
  • Execution of unexpected processes from OmegaT context

Network Indicators:

  • Outbound connections from OmegaT to unknown IPs
  • Unusual data exfiltration patterns

SIEM Query:

process_name:"omegat.exe" AND file_path:"*Roaming\\Omega*" AND file_extension:".conf"

🔗 References

📤 Share & Export