CVE-2024-7609

7.5 HIGH

📋 TL;DR

This path traversal vulnerability in Vidco Software VOC TESTER allows attackers to access files outside the intended directory by manipulating file paths. It affects all VOC TESTER installations before version 12.34.8, potentially exposing sensitive system files.

💻 Affected Systems

Products:
  • Vidco Software VOC TESTER
Versions: All versions before 12.34.8
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with default configuration are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through reading/writing arbitrary files, including sensitive configuration files, credentials, or system binaries.

🟠

Likely Case

Unauthorized access to application files, configuration data, or limited system files depending on service account permissions.

🟢

If Mitigated

Limited to application directory access if proper file system permissions and input validation are enforced.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities typically have low exploitation complexity. Public exploit details not yet available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.34.8

Vendor Advisory: https://github.com/advisories/GHSA-6mh6-642h-83x7

Restart Required: Yes

Instructions:

1. Download VOC TESTER version 12.34.8 or later from official vendor sources. 2. Backup current configuration and data. 3. Install the updated version following vendor installation procedures. 4. Restart the VOC TESTER service.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement input validation to reject path traversal sequences like '../', '..\', and absolute paths

Implement in application code: validate user input for file operations

File System Permissions Restriction

linux

Run VOC TESTER with minimal file system permissions, restricting access to only necessary directories

chmod 750 /path/to/voc-tester/data
chown vocuser:vocgroup /path/to/voc-tester

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block path traversal patterns
  • Isolate VOC TESTER instances in network segments with restricted file access

🔍 How to Verify

Check if Vulnerable:

Check VOC TESTER version in application interface or configuration files. If version is below 12.34.8, system is vulnerable.

Check Version:

Check application interface or configuration file for version information

Verify Fix Applied:

Confirm VOC TESTER version is 12.34.8 or higher after update. Test file access attempts with traversal sequences should be rejected.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed file access attempts with '../' patterns
  • Access to unexpected file paths in application logs

Network Indicators:

  • HTTP requests containing '../' or similar traversal sequences to VOC TESTER endpoints

SIEM Query:

source="voc-tester.log" AND ("../" OR "..\\" OR "/etc/" OR "/windows/")

🔗 References

📤 Share & Export