CVE-2024-8058

7.6 HIGH

📋 TL;DR

An improper parsing vulnerability in FileZ client allows attackers to craft malicious files that, when placed in the FileZ directory, can read arbitrary files on the device through URL preloading. This affects all FileZ client users who process files from untrusted sources. The vulnerability enables unauthorized file access without user interaction.

💻 Affected Systems

Products:
  • FileZ client
Versions: All versions prior to patch
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is present in default installations when processing files from the FileZ directory.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of sensitive data including credentials, configuration files, and personal documents through arbitrary file read.

🟠

Likely Case

Exfiltration of specific targeted files containing sensitive information or credentials.

🟢

If Mitigated

Limited impact with proper file permissions and isolation preventing access to critical system files.

🌐 Internet-Facing: MEDIUM - Requires user to download and process malicious files from external sources.
🏢 Internal Only: MEDIUM - Internal users could be tricked into processing malicious files from network shares or email.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user to process a crafted file, but the technical complexity of creating the malicious file is low.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FileZ client version 3.2.1 or later

Vendor Advisory: https://www.filez.com/securityPolicy/1.html?1733849740

Restart Required: Yes

Instructions:

1. Download latest version from official FileZ website. 2. Uninstall current version. 3. Install new version. 4. Restart system.

🔧 Temporary Workarounds

Restrict FileZ directory permissions

all

Limit write access to FileZ directory to prevent malicious file placement

chmod 700 ~/.filez (Linux/macOS)
icacls "C:\Users\%USERNAME%\AppData\Roaming\FileZ" /deny Everyone:(OI)(CI)W (Windows)

Disable URL preloading feature

all

Turn off URL preloading functionality in FileZ settings

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized files in FileZ directory
  • Use file integrity monitoring to detect unauthorized files in FileZ directory

🔍 How to Verify

Check if Vulnerable:

Check FileZ client version - if below 3.2.1, system is vulnerable

Check Version:

filez --version (Linux/macOS) or check About in FileZ GUI (Windows)

Verify Fix Applied:

Verify FileZ client version is 3.2.1 or higher and test with sample files

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns from FileZ process
  • Multiple failed file read attempts to system directories

Network Indicators:

  • FileZ process making unexpected outbound connections after file processing

SIEM Query:

process:filez AND (file_read:*system* OR file_read:*config*)

🔗 References

📤 Share & Export