Monday, April 28, 2025
HomeCVE/vulnerabilityYeti Forensic Platform Vulnerability Allows Attackers to Execute Remote Code

Yeti Forensic Platform Vulnerability Allows Attackers to Execute Remote Code

Published on

SIEM as a Service

Follow Us on Google News

A critical security flaw has been identified in the popular Yeti Forensic Intelligence platform, exposing its users to unauthenticated remote code execution (RCE) attacks.

Two vulnerabilities designated  CVE-2024-46507 and CVE-2024-46508, affect versions 2.0 to 2.1.11 of the Yeti platform, posing significant risks to cybersecurity and DFIR (Digital Forensics and Incident Response) teams.

Yeti, widely used by threat intelligence professionals, enables users to catalog, analyze, and link observables such as IP addresses, TTPs (Tactics, Techniques, and Procedures), and threat actors.

- Advertisement - Google News

With over 10,000 DockerHub pulls and nearly 2,000 GitHub stars, its popularity underscores the urgency of addressing these vulnerabilities, as per a report by Rhino Security Labs.

New template
New template

CVE-2024-46507: SSTI Leads to Remote Code Execution

The first vulnerability, CVE-2024-46507, involves a Server-Side Template Injection (SSTI) flaw that allows attackers to execute arbitrary code on targeted Yeti servers.

The issue arises from Yeti’s feature allows users to create custom templates for exporting observables like IP addresses, hashes, and domains.

These templates are processed on the backend without input sanitization, leaving the platform susceptible to malicious payloads embedded within the templates.

export template
export template

Steps to Exploit

  1. Create a Malicious Template: Attackers craft a template with embedded malicious commands.
  2. Create an Observable: Observables can be generated via “Observables -> New Observable -> Save.”
  3. Export Observable Using Malicious Template: Upon export, users download a .txt file, which executes the attacker’s command on the server backend.

The consequences can be severe, ranging from attackers gathering intelligence on monitored threat actors to altering or destroying critical observables.

CVE-2024-46508: Static Insecure JWT Secret

The second vulnerability, CVE-2024-46508, exposes Yeti deployments to authentication bypasses due to the use of a static, insecure JWT secret.

During installation, Yeti does not require users to modify the default .env file, where the JWT secret is hardcoded as “SECRET.”

Additionally, Yeti’s documentation does not urge users to configure the secret, increasing the likelihood of unmodified deployments in production environments.

With access to the static JWT secret, attackers can generate valid tokens, bypassing authentication altogether.

When combined with SSTI-driven RCE, this flaw enables attackers to escalate privileges, fully compromise the server, and infiltrate sensitive threat intelligence data.

The vulnerabilities have been patched in version 2.1.12 of Yeti. Users are strongly advised to upgrade immediately. The fixed version can be obtained from the Yeti GitHub repository.

  1. Update to Version 2.1.12: Apply the patch to address both SSTI and JWT vulnerabilities.
  2. Configure Unique Secrets: Ensure that JWT secrets are replaced during installation to prevent authentication bypasses.
  3. Sanitize User Inputs: Employ proper input validation across all modules.

Yeti users in the DFIR community should act promptly to secure their deployments and avoid potential breaches.

Collect Threat Intelligence with TI Lookup to improve your company’s security - Get 50 Free Request

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...