CVE-2024-8685

4.3 MEDIUM

📋 TL;DR

This path traversal vulnerability in Revolution Pi allows authenticated attackers to list directories on the device by manipulating the 'dir' parameter in the '/pictory/php/getFileList.php' endpoint. It affects Revolution Pi devices running the 2022-07-28-revpi-buster version from KUNBUS GmbH. Attackers could potentially discover sensitive files and directory structures.

💻 Affected Systems

Products:
  • Revolution Pi
Versions: 2022-07-28-revpi-buster
Operating Systems: Raspberry Pi OS (based on Debian Buster)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authentication to the Revolution Pi web interface. The vulnerability is in the Pictory configuration software component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker maps entire filesystem structure, discovers sensitive configuration files, credentials, or other critical system information that could lead to further exploitation.

🟠

Likely Case

Attacker enumerates directories to understand system layout and identify potential targets for additional attacks, though actual file access is not confirmed by this CVE.

🟢

If Mitigated

Directory listing reveals limited information but no actual file contents are exposed.

🌐 Internet-Facing: MEDIUM - Requires authentication but could be exploited if device is exposed to internet with weak credentials.
🏢 Internal Only: MEDIUM - Authenticated internal attackers could use this for reconnaissance and lateral movement preparation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and involves simple parameter manipulation in HTTP requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check KUNBUS for latest Revolution Pi updates

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-kunbus-gmbhs-revolution-pi

Restart Required: Yes

Instructions:

1. Check KUNBUS website for security updates. 2. Update Revolution Pi software to latest version. 3. Restart the device. 4. Verify the fix by testing the vulnerable endpoint.

🔧 Temporary Workarounds

Restrict web interface access

linux

Limit access to Revolution Pi web interface to trusted networks only

Configure firewall rules to restrict access to port 80/443 on Revolution Pi

Disable vulnerable endpoint

linux

Remove or restrict access to the vulnerable PHP file

sudo mv /var/www/html/pictory/php/getFileList.php /var/www/html/pictory/php/getFileList.php.disabled
sudo systemctl restart apache2

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Revolution Pi devices
  • Enforce strong authentication policies and monitor for suspicious access patterns

🔍 How to Verify

Check if Vulnerable:

As authenticated user, send HTTP GET request to /pictory/php/getFileList.php with malicious dir parameter (e.g., dir=../../../)

Check Version:

Check Revolution Pi version in web interface or run: cat /etc/revpi/image-release

Verify Fix Applied:

Test the same request after patching - should return error or empty result instead of directory listing

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /pictory/php/getFileList.php with suspicious dir parameters
  • Multiple failed authentication attempts followed by directory listing requests

Network Indicators:

  • Unusual patterns of requests to the Pictory endpoint from single IPs
  • Directory traversal patterns in HTTP parameters

SIEM Query:

source="web_logs" AND uri="/pictory/php/getFileList.php" AND (param.dir=".." OR param.dir CONTAINS "/" OR param.dir CONTAINS "%")

🔗 References

📤 Share & Export