CVE-2024-52875

8.8 HIGH

📋 TL;DR

This vulnerability in GFI Kerio Control allows attackers to perform open redirect, HTTP response splitting, and reflected cross-site scripting (XSS) attacks via unsanitized input in certain web pages. It can escalate to remote command execution by leveraging the admin interface's upgrade feature. Affected users are those running vulnerable versions of GFI Kerio Control, particularly if exposed to untrusted networks.

💻 Affected Systems

Products:
  • GFI Kerio Control
Versions: 9.2.5 through 9.4.5
Operating Systems: All supported OS for Kerio Control
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is present in default configurations and affects the /nonauth/ pages, which are accessible without authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote command execution leading to full system compromise, data theft, or ransomware deployment via the admin upgrade feature.

🟠

Likely Case

Reflected XSS or open redirect attacks enabling session hijacking, phishing, or credential theft against users.

🟢

If Mitigated

Limited impact if patched or network-isolated, with potential for minor data exposure but no system takeover.

🌐 Internet-Facing: HIGH, as the vulnerable pages are unauthenticated and can be exploited remotely via crafted URLs.
🏢 Internal Only: MEDIUM, as internal attackers could still exploit it, but external exposure is reduced.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malicious URLs but does not need authentication; escalation to RCE involves additional steps in the admin interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 9.4.6 or later

Vendor Advisory: https://support.kerio.com/

Restart Required: No

Instructions:

1. Log into the Kerio Control admin interface. 2. Navigate to the update section. 3. Apply the latest patch to upgrade to version 9.4.6 or higher. 4. Verify the update completes successfully.

🔧 Temporary Workarounds

Block Access to Vulnerable Pages

all

Use firewall rules or web application filters to block external access to /nonauth/addCertException.cs, /nonauth/guestConfirm.cs, and /nonauth/expiration.cs.

🧯 If You Can't Patch

  • Isolate the Kerio Control instance from untrusted networks using network segmentation.
  • Implement strict input validation and output encoding at the web server level to mitigate XSS and redirect attacks.

🔍 How to Verify

Check if Vulnerable:

Check the Kerio Control version via the admin interface; if it is between 9.2.5 and 9.4.5 inclusive, it is vulnerable.

Check Version:

In Kerio Control admin, go to Dashboard or System Status to view the current version.

Verify Fix Applied:

After patching, confirm the version is 9.4.6 or later and test that crafted URLs to the vulnerable pages no longer trigger redirects or XSS.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP 302 redirects from /nonauth/ pages with suspicious dest parameters in web server logs.

Network Indicators:

  • HTTP requests containing crafted dest parameters targeting the vulnerable endpoints.

SIEM Query:

source="kerio_control" AND (url_path="/nonauth/addCertException.cs" OR url_path="/nonauth/guestConfirm.cs" OR url_path="/nonauth/expiration.cs") AND http_status=302 AND query_string="*dest=*"

🔗 References

📤 Share & Export