<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>SimpleHelp — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/simplehelp/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 25 Jun 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/simplehelp/feed.xml" rel="self" type="application/rss+xml"/><item><title>SimpleHelp Missing Authorization Vulnerability Leads to Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2024-06-simplehelp-privesc/</link><pubDate>Tue, 25 Jun 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-06-simplehelp-privesc/</guid><description>A missing authorization vulnerability in SimpleHelp (CVE-2024-57726) allows low-privileged technicians to create API keys with excessive permissions, potentially escalating privileges to the server admin role.</description><content:encoded><![CDATA[<p>CVE-2024-57726 affects SimpleHelp, a remote support software solution. This vulnerability stems from a missing authorization check, allowing low-privileged technicians to create API keys with elevated permissions beyond their intended scope. Specifically, these API keys can be manipulated to grant server admin privileges, potentially enabling unauthorized access to sensitive data and critical system configurations. The vulnerability impacts SimpleHelp versions 5.5.7 and earlier. Successful exploitation allows attackers to bypass intended access controls, gain complete control over the SimpleHelp server, and potentially pivot to other systems within the network. This vulnerability was disclosed in January 2025, and organizations using affected SimpleHelp versions are at risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A low-privileged technician logs into the SimpleHelp console with their existing credentials.</li>
<li>The technician leverages the missing authorization vulnerability to create a new API key.</li>
<li>During API key creation, the attacker manipulates the request to assign excessive permissions beyond their authorized access level.</li>
<li>The attacker uses the newly created API key to authenticate against the SimpleHelp API.</li>
<li>The attacker leverages the elevated permissions granted by the manipulated API key to access administrative functions.</li>
<li>The attacker escalates their privileges to the server admin role, granting them complete control over the SimpleHelp server.</li>
<li>The attacker uses the server admin role to access sensitive data, modify system configurations, or create new administrative accounts.</li>
<li>The attacker potentially pivots to other systems within the network using the compromised SimpleHelp server as a stepping stone.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2024-57726 allows low-privileged technicians, or malicious actors who have compromised technician accounts, to escalate their privileges to the server admin role in SimpleHelp. This grants them complete control over the SimpleHelp server, potentially leading to data breaches, system downtime, and further compromise of the network. The vulnerability affects organizations using SimpleHelp versions 5.5.7 and earlier. The number of victims and specific sectors targeted remain unknown, but the potential impact is significant due to the sensitive nature of remote support software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply mitigations provided by SimpleHelp to patch the missing authorization vulnerability in SimpleHelp versions 5.5.7 and earlier (reference: <a href="https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier)">https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier)</a>.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious SimpleHelp API Key Creation</code> to identify attempts to create API keys with excessive permissions.</li>
<li>Follow applicable BOD 22-01 guidance for cloud services or discontinue use of SimpleHelp if mitigations are unavailable.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>missing-authorization</category><category>cloud</category></item><item><title>SimpleHelp Path Traversal Vulnerability (CVE-2024-57728)</title><link>https://feed.craftedsignal.io/briefs/2024-06-simplehelp-path-traversal/</link><pubDate>Tue, 25 Jun 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-06-simplehelp-path-traversal/</guid><description>CVE-2024-57728 is a path traversal vulnerability in SimpleHelp that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>A path traversal vulnerability exists within SimpleHelp, identified as CVE-2024-57728. This flaw enables authenticated administrators to upload arbitrary files to any location on the server&rsquo;s file system. This is achieved through the use of a specially crafted ZIP archive (a technique known as Zip Slip). Successful exploitation allows an attacker to execute arbitrary code within the security context of the SimpleHelp server user. The vulnerability impacts SimpleHelp versions 5.5.7 and earlier. Defenders should apply vendor-provided mitigations or discontinue use of the software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains administrative access to the SimpleHelp console, either through compromised credentials or exploiting a separate authentication bypass.</li>
<li>The attacker crafts a malicious ZIP archive containing a file with a path traversal sequence (e.g., &ldquo;../../ malicious.exe&rdquo;) in its filename.</li>
<li>The attacker uploads the crafted ZIP archive to the SimpleHelp server through a file upload functionality available to administrators.</li>
<li>The SimpleHelp server extracts the contents of the ZIP archive without proper validation of the file paths.</li>
<li>The file with the path traversal sequence is extracted to an arbitrary location on the file system outside of the intended upload directory.</li>
<li>The attacker leverages a method to execute the uploaded malicious executable. This could involve overwriting an existing system utility or service executable.</li>
<li>The malicious executable runs with the privileges of the SimpleHelp server user.</li>
<li>The attacker achieves arbitrary code execution on the host, potentially leading to complete system compromise, data exfiltration, or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2024-57728 allows an attacker to execute arbitrary code on the SimpleHelp server with the privileges of the SimpleHelp service account. This can result in a full compromise of the SimpleHelp server, potentially leading to data theft, service disruption, or further lateral movement within the network. The vulnerability affects SimpleHelp installations, and the impact is high due to the potential for complete system takeover.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the mitigations provided by SimpleHelp to patch the vulnerability. Refer to the vendor advisory for instructions: <a href="https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier">https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier</a></li>
<li>Monitor SimpleHelp server file uploads for ZIP archives containing path traversal sequences (e.g., &ldquo;../&rdquo;) in filenames using a file integrity monitoring system (FIM) or endpoint detection and response (EDR) solution. Deploy the &ldquo;Detect SimpleHelp Path Traversal ZIP Upload&rdquo; Sigma rule to identify suspicious ZIP files.</li>
<li>Implement strict access controls and regularly audit administrative access to the SimpleHelp console to prevent unauthorized users from exploiting the vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2024-57728</category><category>path-traversal</category><category>zip-slip</category></item></channel></rss>