CVE-2024-53303

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary code on LRQA Nettitude PoshC2 servers by exploiting a flaw in the upload_file function. Attackers can achieve remote code execution via crafted POST requests. Only systems running PoshC2 after commit 123db87 are affected.

💻 Affected Systems

Products:
  • LRQA Nettitude PoshC2
Versions: Versions after commit 123db87
Operating Systems: All platforms running PoshC2
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects authenticated users; default configurations with authentication enabled are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, steal data, pivot to other systems, and establish persistent access.

🟠

Likely Case

Attackers with valid credentials can execute code on the PoshC2 server, potentially compromising the entire command and control infrastructure.

🟢

If Mitigated

With proper authentication controls and network segmentation, impact is limited to the PoshC2 server itself.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid authentication credentials; proof-of-concept code is publicly available in the GitHub gist reference.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to latest version if fix has been implemented, or apply workarounds.

🔧 Temporary Workarounds

Disable file upload functionality

all

Temporarily disable or restrict the upload_file function in PoshC2 configuration

# Edit PoshC2 configuration to disable upload_file endpoint

Implement strict authentication controls

all

Enforce strong authentication policies and limit user access to PoshC2 interface

# Configure strong authentication mechanisms and access controls

🧯 If You Can't Patch

  • Isolate PoshC2 server from critical networks using firewall rules
  • Implement network segmentation and monitor for suspicious POST requests to upload endpoints

🔍 How to Verify

Check if Vulnerable:

Check PoshC2 commit history to see if system is running code after commit 123db87

Check Version:

git log --oneline | head -20

Verify Fix Applied:

Verify that upload_file function has been patched or disabled in current configuration

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to upload_file endpoint
  • Multiple failed authentication attempts followed by successful upload

Network Indicators:

  • Suspicious POST requests with crafted payloads to PoshC2 upload endpoints

SIEM Query:

source="poshc2.log" AND (POST AND upload_file) AND (status=200 OR status=201)

🔗 References

📤 Share & Export