CVE-2024-55354

8.8 HIGH

📋 TL;DR

This vulnerability in Lucee CFML engine allows attackers who can place files on the server to bypass security protections and execute arbitrary code. It affects Lucee installations where attackers have file upload capabilities. The vulnerability enables access to resources that should be protected by Lucee's security mechanisms.

💻 Affected Systems

Products:
  • Lucee CFML Engine
Versions: Lucee 5.x before 5.4.7.3 LTS, Lucee 6.x before 6.1.1.118
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker ability to place files on server, typically through file upload functionality or other file write vectors.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise allowing remote code execution, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Unauthorized code execution leading to web application compromise, data manipulation, and potential privilege escalation.

🟢

If Mitigated

Limited impact if file upload capabilities are restricted and proper access controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires file placement capability plus knowledge of the protection bypass mechanism.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Lucee 5.4.7.3 LTS or 6.1.1.118

Vendor Advisory: https://dev.lucee.org/t/lucee-cve-2024-55354-security-advisory-april-2025/14963

Restart Required: Yes

Instructions:

1. Backup your Lucee installation and configuration. 2. Download the patched version from lucee.org. 3. Replace the existing Lucee installation with the patched version. 4. Restart the Lucee service/application server. 5. Verify the version is updated.

🔧 Temporary Workarounds

Restrict File Upload Capabilities

all

Limit or disable file upload functionality to prevent attackers from placing files on the server.

Implement File System Permissions

linux

Set strict file system permissions to prevent unauthorized file writes to Lucee directories.

chmod 750 /path/to/lucee/directories
chown lucee:lucee /path/to/lucee/directories

🧯 If You Can't Patch

  • Implement strict file upload validation and sanitization
  • Deploy web application firewall with RCE protection rules

🔍 How to Verify

Check if Vulnerable:

Check Lucee version via admin interface or by examining lucee-server.xml file for version information.

Check Version:

Check Lucee admin interface at /lucee/admin/server.cfm or examine /WEB-INF/lucee/lucee-server.xml

Verify Fix Applied:

Confirm version is 5.4.7.3 LTS or higher for Lucee 5, or 6.1.1.118 or higher for Lucee 6.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file writes to Lucee directories
  • Execution of unexpected CFML files
  • Security bypass attempts in application logs

Network Indicators:

  • Unusual outbound connections from Lucee server
  • Requests to unexpected CFML endpoints

SIEM Query:

source="lucee.log" AND ("file.write" OR "security.bypass" OR "unauthorized.execution")

🔗 References

📤 Share & Export