CVE-2024-57338

6.5 MEDIUM

📋 TL;DR

This vulnerability allows attackers to upload malicious files to M2Soft CROWNIX Report & ERS systems, potentially leading to remote code execution. Affected versions include v5.x to v5.5.14.1070, v7.x to v7.4.3.960, and v8.x to v8.2.0.345. Organizations using these versions should patch immediately.

💻 Affected Systems

Products:
  • M2Soft CROWNIX Report & ERS
Versions: v5.x to v5.5.14.1070, v7.x to v7.4.3.960, v8.x to v8.2.0.345
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within affected version ranges are vulnerable by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the server, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Webshell deployment leading to persistent access, data theft, and potential ransomware deployment.

🟢

If Mitigated

Limited impact with proper file upload validation and execution restrictions in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Arbitrary file upload vulnerabilities typically have low exploitation complexity once the upload endpoint is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions above v5.5.14.1070, v7.4.3.960, and v8.2.0.345

Vendor Advisory: https://www.m2soft.co.kr/sub/board/news.asp?mode=view&idx=2411

Restart Required: Yes

Instructions:

1. Download latest version from M2Soft website. 2. Backup current installation. 3. Install updated version. 4. Restart application services.

🔧 Temporary Workarounds

File Upload Restriction

all

Implement strict file upload validation including file type checking, size limits, and content inspection.

Web Application Firewall Rules

all

Deploy WAF rules to block suspicious file upload patterns and executable file extensions.

🧯 If You Can't Patch

  • Isolate affected systems from internet access and restrict internal network communication.
  • Implement strict file upload validation at the application level and monitor for suspicious upload attempts.

🔍 How to Verify

Check if Vulnerable:

Check application version against affected ranges in the vendor advisory.

Check Version:

Check application interface or installation directory for version information.

Verify Fix Applied:

Verify installed version is above v5.5.14.1070, v7.4.3.960, or v8.2.0.345 depending on your major version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads, especially with executable extensions
  • Multiple failed upload attempts
  • Webshell creation in upload directories

Network Indicators:

  • HTTP POST requests to upload endpoints with suspicious file content
  • Outbound connections from application server to unknown IPs

SIEM Query:

source="crownix_logs" AND (event="file_upload" AND file_extension IN ("php", "jsp", "asp", "exe", "dll"))

🔗 References

📤 Share & Export