CVE-2024-57728

7.2 HIGH

📋 TL;DR

CVE-2024-57728 is a path traversal vulnerability in SimpleHelp remote support software that allows authenticated admin users to upload arbitrary files anywhere on the file system via crafted zip archives (zip slip). This can lead to remote code execution in the context of the SimpleHelp server user. Affected systems are SimpleHelp v5.5.7 and earlier installations.

💻 Affected Systems

Products:
  • SimpleHelp Remote Support Software
Versions: v5.5.7 and earlier
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin user credentials to exploit. All installations with default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining persistent access, installing backdoors, stealing sensitive data, and moving laterally to other systems.

🟠

Likely Case

Attacker gains initial foothold on the server, executes arbitrary commands, and establishes persistence for further attacks.

🟢

If Mitigated

Attack limited to file system access within SimpleHelp's context if proper network segmentation and least privilege are implemented.

🌐 Internet-Facing: HIGH - SimpleHelp is typically exposed to the internet for remote support functionality, making it directly accessible to attackers.
🏢 Internal Only: MEDIUM - Internal attackers with admin credentials could exploit this, but requires authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires admin credentials and ability to craft malicious zip files. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v5.5.8 or later

Vendor Advisory: https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier

Restart Required: No

Instructions:

1. Download SimpleHelp v5.5.8 or later from vendor website. 2. Backup current installation. 3. Install the updated version following vendor instructions. 4. Verify successful update.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit admin user accounts to only trusted personnel and implement strong authentication controls.

Network Segmentation

all

Place SimpleHelp server in isolated network segment with restricted inbound/outbound access.

🧯 If You Can't Patch

  • Implement strict access controls and monitor all admin user activities
  • Deploy file integrity monitoring on SimpleHelp installation directories

🔍 How to Verify

Check if Vulnerable:

Check SimpleHelp version in admin interface or installation directory. Versions 5.5.7 and earlier are vulnerable.

Check Version:

Check SimpleHelp admin web interface or examine version.txt in installation directory

Verify Fix Applied:

Verify version is 5.5.8 or later in admin interface. Test file upload functionality with safe test files.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload activities by admin users
  • File writes outside expected SimpleHelp directories
  • Suspicious process execution from SimpleHelp context

Network Indicators:

  • Unusual outbound connections from SimpleHelp server
  • Suspicious file transfer patterns

SIEM Query:

source="simplehelp" AND (event="file_upload" OR event="admin_action") AND (file_path CONTAINS ".." OR file_path NOT CONTAINS "expected_path")

🔗 References

📤 Share & Export