CVE-2024-57784

5.5 MEDIUM

📋 TL;DR

This vulnerability allows attackers to perform directory traversal attacks through the /php/script_uploads.php component in Zenitel AlphaWeb XE. Attackers can potentially access files outside the intended directory. Organizations using Zenitel AlphaWeb XE v11.2.3.10 are affected.

💻 Affected Systems

Products:
  • Zenitel AlphaWeb XE
Versions: v11.2.3.10
Operating Systems: All platforms running Zenitel AlphaWeb XE
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the /php/script_uploads.php endpoint to be accessible

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files, configuration files, or source code, potentially leading to further system compromise.

🟠

Likely Case

Unauthorized file access leading to information disclosure of web-accessible files.

🟢

If Mitigated

Limited impact if proper file permissions and web server configurations restrict access to sensitive directories.

🌐 Internet-Facing: HIGH - Web-accessible component with directory traversal vulnerability
🏢 Internal Only: MEDIUM - Still exploitable by internal attackers or compromised internal systems

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available in GitHub gist. Simple HTTP requests with directory traversal sequences can exploit this vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check Zenitel vendor website for security updates. No official patch information available at this time.

🔧 Temporary Workarounds

Restrict access to vulnerable endpoint

all

Block or restrict access to /php/script_uploads.php using web server configuration or firewall rules

# Apache: Add to .htaccess or virtual host config
<Files "script_uploads.php">
    Order Deny,Allow
    Deny from all
</Files>
# Nginx: Add to server block
location ~ /php/script_uploads\.php$ {
    deny all;
    return 403;
}

Implement input validation

all

Add input validation to sanitize file path parameters and prevent directory traversal sequences

# PHP example: Validate and sanitize input
$filename = basename($_GET['file']);
$path = '/allowed/directory/' . $filename;
if (strpos($filename, '..') !== false || strpos($filename, '/') !== false) {
    die('Invalid file request');
}

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Zenitel AlphaWeb XE systems
  • Deploy web application firewall (WAF) with directory traversal protection rules

🔍 How to Verify

Check if Vulnerable:

Test by sending HTTP request to /php/script_uploads.php with directory traversal payload (e.g., ?file=../../etc/passwd) and check response

Check Version:

Check Zenitel AlphaWeb XE version in web interface or configuration files

Verify Fix Applied:

Attempt exploitation after applying workarounds to confirm vulnerability is mitigated

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /php/script_uploads.php with '..' sequences in parameters
  • Unusual file access patterns from web server process

Network Indicators:

  • HTTP requests containing directory traversal sequences (../, ..\, %2e%2e%2f)

SIEM Query:

source="web_server_logs" AND uri_path="/php/script_uploads.php" AND (query_string="*..*" OR user_agent="*..*")

🔗 References

📤 Share & Export