CVE-2024-54453

7.5 HIGH

📋 TL;DR

A path traversal vulnerability in Kurmi Provisioning Suite's DocServlet servlet allows remote attackers to read any file from the web application installation folder. This could expose sensitive files like obfuscated source code, configuration files, or credentials. Affected versions are before 7.9.0.35, 7.10.x through 7.10.0.18, and 7.11.x through 7.11.0.15.

💻 Affected Systems

Products:
  • Kurmi Provisioning Suite
Versions: Before 7.9.0.35, 7.10.x through 7.10.0.18, 7.11.x through 7.11.0.15
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within affected version ranges are vulnerable by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers retrieve sensitive configuration files containing database credentials, API keys, or encryption keys, leading to full system compromise, data exfiltration, or lateral movement.

🟠

Likely Case

Attackers access obfuscated source code to analyze for additional vulnerabilities, or retrieve configuration files that may contain sensitive information.

🟢

If Mitigated

Limited exposure of non-critical files if proper access controls and network segmentation are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities typically require minimal technical skill to exploit via crafted HTTP requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.9.0.35, 7.10.0.19, 7.11.0.16 or later

Vendor Advisory: https://kurmi-software.com/cve/cve-2024-54453/

Restart Required: Yes

Instructions:

1. Download the patched version from Kurmi Software. 2. Backup current installation. 3. Apply the patch according to vendor instructions. 4. Restart the Kurmi Provisioning Suite service.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to the Kurmi web application to trusted IP addresses only.

Web Server Configuration

all

Configure web server (e.g., Apache, IIS) to block requests containing path traversal patterns like '../' or absolute paths.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Kurmi server from untrusted networks.
  • Deploy a web application firewall (WAF) with rules to detect and block path traversal attempts.

🔍 How to Verify

Check if Vulnerable:

Check the Kurmi Provisioning Suite version via the web interface or configuration files. If version matches affected ranges, assume vulnerable.

Check Version:

Check web interface or consult Kurmi documentation for version check command specific to your installation.

Verify Fix Applied:

After patching, verify the version is 7.9.0.35+, 7.10.0.19+, or 7.11.0.16+. Test with controlled path traversal attempts to confirm blocking.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '../' patterns to DocServlet endpoints
  • Unusual file access patterns in web server logs

Network Indicators:

  • HTTP requests with path traversal payloads (e.g., GET /DocServlet?file=../../../etc/passwd)

SIEM Query:

source="web_server_logs" AND uri="*DocServlet*" AND (uri="*../*" OR uri="*..\\*" OR uri="*%2e%2e%2f*")

🔗 References

📤 Share & Export