The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a serious vulnerability in the NAKIVO Backup and Replication software, known as CVE-2024-48248.
This vulnerability allows attackers to exploit an absolute path traversal flaw, enabling them to read arbitrary files without authentication.
The vulnerability resides in the Director Web Interface of the NAKIVO Backup and Replication solution, specifically in the STPreLoadManagement action through the /c/router endpoint.
By manipulating the file path parameter, attackers can access any file on the system the software is running on. This includes critical system files and backup data, which could lead to unauthorized data exfiltration or other malicious activities.
Given the nature of the vulnerability, attackers can exploit it to read sensitive information such as system files, database credentials, and backup data.
The NAKIVO software often integrates with cloud environments, virtual infrastructure, and network devices, making the potential impact extensive.
The attackers could use this vulnerability to access AWS keys, SSH credentials, or other privileged information stored by NAKIVO for backup operations.
A proof-of-concept (PoC) for this vulnerability has been demonstrated. It involves sending a crafted request to the /c/router endpoint with the following payload:
POST /c/router HTTP/1.1
Host: {{Hostname}}
Content-Type: application/json
Connection: keep-alive
Content-Length: 121
{
"action": "STPreLoadManagement",
"method": "getImageByPath",
"data": ["C:/windows/win.ini"],
"type": "rpc",
"tid": 3980,
"sid": ""
}
This request uses the getImageByPath method of the STPreLoadManagement action to read the C:/windows/win.ini file on a Windows system.
Similarly, attackers could use this method to read sensitive files like /etc/shadow on Linux systems.
NAKIVO has quietly patched the vulnerability in version 11.0.0.88174 and later releases.
The fix prevents directory traversal by ensuring that file paths are sanitized using the FileUtils library, which constructs a safe file path by stripping parent directory references and path manipulation attempts.
In the patched version:
public byte[] getImageByPath(String path) throws IOException {
String fileName = FilenameUtils.getName(path);
File targetFile = FileUtils.getFile(new String[] { "userdata", "branding", fileName });
if (!targetFile.exists() || !targetFile.canRead() || targetFile.isDirectory()) {
throw new IOException(Lang.get("services.branding.no.file", new Object[0]));
}
return FileUtils.readFileToByteArray(targetFile);
}
CISA recommends that users apply vendor-provided patches immediately. If patches are not available, users should consider discontinuing use of the product until a fix is provided.
Additionally, following best practices for securing cloud services, as outlined in Binding Operational Directive (BOD) 22-01, can help mitigate potential risks associated with vulnerabilities like CVE-2024-48248.
The NAKIVO vulnerability highlights the increasing importance of securing backup solutions, particularly in environments where these systems often hold critical data.
As ransomware attacks continue to evolve, ensuring that backup mechanisms are robust and secure is crucial.
Users and organizations must remain vigilant and proactive in addressing vulnerabilities such as CVE-2024-48248 to protect against emerging threats.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
A recent open-source investigation has uncovered one of the largest exposures of US government data…
A concerning development has emerged with the active exploitation of Apache Tomcat servers through the…
A recent cybersecurity threat, identified as UAT-5918, has been actively targeting entities in Taiwan, particularly…
In a recent analysis by Elastic Security Labs, a malicious driver known as ABYSSWORKER has…
Researchers uncovered critical Remote Code Execution (RCE) vulnerabilities in the Veeam Backup & Replication solution.…
The cybersecurity landscape has been recently disrupted by the emergence of the VanHelsing ransomware, a…