First published: Mon Jun 24 2024(Updated: )
A security vulnerability has been identified in Bludit, allowing attackers with knowledge of the API token to upload arbitrary files through the File API which leads to arbitrary code execution on the server. This vulnerability arises from improper handling of file uploads, enabling malicious actors to upload and execute PHP files.
Credit: vulnerability@ncsc.ch
Affected Software | Affected Version | How to fix |
---|---|---|
Bludit |
1. Remove file upload API: As the API POST request for uploading files is not documented, it can be assumed that it is a feature not actually needed by Bludit users. This is substantiated by the fact that users also cannot upload arbitrary files with the web application (AJAX). 2. Use an allowlist: If the first suggestion is not feasible as it is an actively used feature of Bludit users, it is advised to restrict the possible upload file formats with an allowlist. Before storing the uploaded files in the intended directory, their file extension and mime type should be checked. 3. Restrict upload storage: Users should only be allowed to store a certain amount of data on the file share (e.g. 10MB). 4. If uploaded files should not be downloadable by everyone: Ensure that the temporary file directory is relocated outside of the web root to prevent unauthorized access. 5. If uploaded files should be downloadable: Disable PHP in upload folder, e.g. with the following configuration in nginx: ``` location /upload_folder { # Disable PHP execution location ~ \.php$ { deny all; } # Allow other file types location /upload_folder/ { # Additional configurations for other file types if necessary } } ```
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24550 is rated as a high-severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2024-24550, ensure that the Bludit software is updated to the latest version that patched this vulnerability.
CVE-2024-24550 allows attackers to upload arbitrary files, leading to potential remote code execution on the server.
CVE-2024-24550 affects all versions of Bludit that improperly handle file uploads.
Currently, there are no recommended workarounds for CVE-2024-24550; updating the software is the best mitigation strategy.