CVE-2024-51376

7.5 HIGH

📋 TL;DR

A directory traversal vulnerability in yeqifu carRental v1.0 allows remote attackers to access sensitive files outside the intended directory via the file/downloadFile.action endpoint. This affects all deployments of yeqifu carRental version 1.0 that expose the vulnerable component.

💻 Affected Systems

Products:
  • yeqifu carRental
Versions: v1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of yeqifu carRental v1.0 are vulnerable if the file/downloadFile.action endpoint is accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through retrieval of sensitive files like configuration files, passwords, SSH keys, or database credentials, potentially leading to full system takeover.

🟠

Likely Case

Unauthorized access to sensitive application files, configuration data, or user information stored on the server.

🟢

If Mitigated

Limited impact with proper file system permissions and web server restrictions preventing access to critical system files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only web access to the vulnerable endpoint with crafted path parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown - check GitHub repository for updates

Vendor Advisory: https://github.com/yeqifu/carRental/issues/43

Restart Required: No

Instructions:

1. Check the GitHub repository for security updates. 2. Apply any available patches. 3. Validate the fix by testing the vulnerable endpoint.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation to block directory traversal sequences in the path parameter

Implement server-side validation to reject paths containing '../', '..\', or absolute paths

Web Server Restrictions

all

Configure web server to restrict access to sensitive directories

Configure .htaccess (Apache) or nginx location blocks to limit file access

🧯 If You Can't Patch

  • Implement a web application firewall (WAF) with directory traversal protection rules
  • Restrict network access to the application using firewall rules or network segmentation

🔍 How to Verify

Check if Vulnerable:

Test by accessing http://[target]/file/downloadFile.action?path=../../../../etc/passwd and checking for file content leakage

Check Version:

Check application version in web interface or configuration files

Verify Fix Applied:

Retest the vulnerable endpoint with traversal payloads and verify proper error responses or access denial

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to file/downloadFile.action with path parameters containing '../' or '..\' sequences
  • Unusual file access patterns from web logs

Network Indicators:

  • HTTP GET requests with traversal sequences in URL parameters

SIEM Query:

web.url:*file/downloadFile.action* AND (web.param.path:*../* OR web.param.path:*..\*)

🔗 References

📤 Share & Export