Skip to content

LuisMateo1/Arbitrary-File-Read-CVE-2024-24919

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 

Repository files navigation

Arbitrary File Read CVE-2024-24919

Here is the alert received on the SIEM image

Firstly, what is CVE-2024-24919? Here is the description on the NIST website. image

After some more research, CVE-2024-24919 is a path traversal attack, which explains the request being made to the '/etc/passwd' directory. image

The /etc/passwd directory stores user account information, including the user's username, user ID (UID), group ID (GID), home directory, and login shell

This is enough for me to contain the server, and I'll investigate further for any more signs of compromise. image

Investigating the suspisous IP

First, I'll start by checking the source IP on the threat intelligence feed. It has been flagged as malicious, specifically because of CVE-2024-24919 image

It has also been reported on AbuseIPDB and VirusTotal image image

Searching the logs for the source IP shows three events. image Two of the events correlate with what was seen on the SIEM alert.

Investigating the first log (No Event Time), it says the source address is 203.160.68.12 (the suspicious IP). image

However, the raw log says that the IP is 203.160.68.13; this time, it's requesting the '/etc/shadow' directory. This directory stores the encrypted password hashes for user accounts on the system. Also, searching the logs for 203.160.68.13 shows no results, and it's not flagged in the threat intel feed or on AbuseIPDB/Talos/VirusTotal.

image

Investigating 203.160.68.13 further

Checking the logs for the destination IP (172.16.20.146) shows the same logs seen above and another containing a list of IPs that accessed the server. Here, we see 203.160.68.12 did make three separate connections, and 203.160.68.13 made only one. image

The destination address (172.16.20.146) is a server, and it made three connections with 203.160.68.12 and two with 203.160.68.13

image image

Response

The server (172.16.20.146) has been quarantined and I've blacklisted the two suspicious IPs: 203.160.68.12 and 203.160.68.13. All the impacted users should change their passwords as a precaution.

Summary

The attackers conducted a path traversal attack, accessing the data within the /etc/passwd and /etc/shadow directories. These files hold user information, including usernames, user IDs, and hashed passwords. If the attackers figure out the hash algorithm used, they could figure out the passwords. The server was contained and the suspicious IPs were blacklisted, and all the impacted users should change their passwords as a precaution.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published