CVE-2024-57669

7.5 HIGH

📋 TL;DR

A directory traversal vulnerability in Zrlog backup-sql-file.jar v3.0.31 allows remote attackers to read arbitrary files on the server by manipulating file paths in backup requests. This affects all systems running the vulnerable Zrlog plugin version. Attackers can potentially access sensitive configuration files, credentials, or other protected data.

💻 Affected Systems

Products:
  • Zrlog backup-sql-file plugin
Versions: v3.0.31
Operating Systems: All platforms running Java
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with the vulnerable plugin installed and enabled. The vulnerability is in the BackupController.java component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through reading sensitive files like configuration files containing database credentials, SSH keys, or other authentication secrets, leading to data breach or further system exploitation.

🟠

Likely Case

Unauthorized access to sensitive files such as configuration files, logs, or backup files containing application data or credentials.

🟢

If Mitigated

Limited impact with proper file permissions and network segmentation preventing access to critical system files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of the backup functionality and ability to craft malicious requests. No public exploit code has been released.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in commit 32bdb36e6cc4f0b72e1ba85ef4458fb980946ea4

Vendor Advisory: https://github.com/94fzb/zrlog/issues/193

Restart Required: No

Instructions:

1. Update to the latest version of the backup-sql-file plugin. 2. Replace the vulnerable backup-sql-file.jar file with the patched version. 3. Verify the fix by checking the BackupController.java file for proper path validation.

🔧 Temporary Workarounds

Disable backup functionality

all

Temporarily disable the backup plugin or restrict access to backup endpoints

Remove or rename backup-sql-file.jar from plugin directory

Network access restrictions

linux

Restrict network access to the Zrlog application using firewall rules

iptables -A INPUT -p tcp --dport [Zrlog-port] -s [trusted-ips] -j ACCEPT
iptables -A INPUT -p tcp --dport [Zrlog-port] -j DROP

🧯 If You Can't Patch

  • Implement strict file system permissions to limit what files the Zrlog process can read
  • Deploy a web application firewall (WAF) with directory traversal protection rules

🔍 How to Verify

Check if Vulnerable:

Check if backup-sql-file.jar version 3.0.31 is present in the Zrlog plugins directory

Check Version:

java -jar backup-sql-file.jar --version or check plugin metadata

Verify Fix Applied:

Verify the BackupController.java file contains proper path validation and no longer allows directory traversal sequences like '../'

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in application logs
  • Requests to backup endpoints with path traversal sequences (../, ..\)
  • Failed file access attempts outside expected directories

Network Indicators:

  • HTTP requests containing '../' patterns to backup endpoints
  • Unusual file download patterns from the Zrlog server

SIEM Query:

source="zrlog.log" AND ("../" OR "..\\" OR "%2e%2e%2f") AND ("backup" OR "download")

🔗 References

📤 Share & Export