CVE-2024-58298

N/A Unknown

📋 TL;DR

Compuware iStrobe Web 20.13 contains a pre-authentication remote code execution vulnerability that allows unauthenticated attackers to upload malicious JSP files via path traversal in the file upload form. Attackers can exploit the 'fileName' parameter to upload a web shell and execute arbitrary commands by sending POST requests to the uploaded JSP endpoint. This affects all systems running the vulnerable version of iStrobe Web.

💻 Affected Systems

Products:
  • Compuware iStrobe Web
Versions: 20.13
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the file upload functionality and requires the web interface to be accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, steal sensitive data, install malware, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Attackers deploy web shells to execute commands, exfiltrate data, and potentially move laterally within the network.

🟢

If Mitigated

Limited impact due to network segmentation, strict access controls, and monitoring that detects exploitation attempts.

🌐 Internet-Facing: HIGH - Unauthenticated attackers can exploit this vulnerability remotely without any credentials.
🏢 Internal Only: HIGH - Even internally, unauthenticated users or compromised systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available on Exploit-DB (ID 51991), making this easily weaponizable by attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.bmc.com/support

Restart Required: No

Instructions:

Check BMC support for official patches or updates. If no patch is available, implement workarounds immediately.

🔧 Temporary Workarounds

Block File Upload Endpoint

all

Restrict access to the vulnerable file upload endpoint using web application firewall or network controls.

Network Segmentation

all

Isolate iStrobe Web systems from the internet and restrict internal access to authorized users only.

🧯 If You Can't Patch

  • Immediately restrict network access to the iStrobe Web interface using firewall rules to allow only trusted IP addresses.
  • Implement strict monitoring for file upload activities and JSP file execution attempts in web server logs.

🔍 How to Verify

Check if Vulnerable:

Check if running iStrobe Web version 20.13. Review web server logs for unauthorized file upload attempts to JSP endpoints.

Check Version:

Check the iStrobe Web administration interface or application configuration files for version information.

Verify Fix Applied:

Verify that file upload functionality is disabled or properly secured. Test that path traversal attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to JSP endpoints
  • POST requests to unexpected JSP files
  • Path traversal patterns in file upload parameters

Network Indicators:

  • Unusual outbound connections from iStrobe Web server
  • Traffic patterns indicating command execution

SIEM Query:

source="iStrobe Web" AND (url="*upload*" OR url="*.jsp") AND (method="POST" OR status="200")

🔗 References

📤 Share & Export