CVE-2024-57170

6.5 MEDIUM

📋 TL;DR

SOPlanning 1.53.00 has a directory traversal vulnerability in the upload.php file that allows authenticated attackers to delete arbitrary files by manipulating the 'fichier_to_delete' parameter with path traversal sequences like '../'. This affects all installations running the vulnerable version, potentially causing denial of service or application disruption.

💻 Affected Systems

Products:
  • SOPlanning
Versions: 1.53.00
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to exploit. All default installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise if critical system files are deleted, leading to OS instability, data loss, or permanent application unavailability.

🟠

Likely Case

Application disruption or denial of service through deletion of configuration files, user data, or application components.

🟢

If Mitigated

Limited impact if file permissions restrict deletion to non-critical application files only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward with directory traversal sequences.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch available. Monitor vendor for updates.

🔧 Temporary Workarounds

Input Validation Filter

all

Add input validation to filter directory traversal sequences from the 'fichier_to_delete' parameter.

Modify /process/upload.php to sanitize input using functions like realpath() or basename()

File Permission Restriction

linux

Restrict file deletion permissions to specific directories only.

chmod 755 /path/to/upload/directory
chown www-data:www-data /path/to/upload/directory

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block directory traversal patterns in requests.
  • Restrict authenticated user access to only trusted users and implement strong authentication controls.

🔍 How to Verify

Check if Vulnerable:

Check if SOPlanning version is 1.53.00 and review /process/upload.php for lack of input validation on 'fichier_to_delete' parameter.

Check Version:

Check SOPlanning configuration files or admin interface for version information.

Verify Fix Applied:

Test if directory traversal sequences in 'fichier_to_delete' parameter are properly filtered or rejected.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /process/upload.php with 'fichier_to_delete' parameter containing '../' sequences
  • File deletion errors in application logs

Network Indicators:

  • POST requests to upload.php with suspicious file paths

SIEM Query:

source="web_logs" AND uri="/process/upload.php" AND (param="fichier_to_delete" AND value="*../*")

🔗 References

📤 Share & Export