<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2024-57728 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2024-57728/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 25 Jun 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2024-57728/feed.xml" rel="self" type="application/rss+xml"/><item><title>SimpleHelp Path Traversal Vulnerability (CVE-2024-57728)</title><link>https://feed.craftedsignal.io/briefs/2024-06-simplehelp-path-traversal/</link><pubDate>Tue, 25 Jun 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-06-simplehelp-path-traversal/</guid><description>CVE-2024-57728 is a path traversal vulnerability in SimpleHelp that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>A path traversal vulnerability exists within SimpleHelp, identified as CVE-2024-57728. This flaw enables authenticated administrators to upload arbitrary files to any location on the server&rsquo;s file system. This is achieved through the use of a specially crafted ZIP archive (a technique known as Zip Slip). Successful exploitation allows an attacker to execute arbitrary code within the security context of the SimpleHelp server user. The vulnerability impacts SimpleHelp versions 5.5.7 and earlier. Defenders should apply vendor-provided mitigations or discontinue use of the software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains administrative access to the SimpleHelp console, either through compromised credentials or exploiting a separate authentication bypass.</li>
<li>The attacker crafts a malicious ZIP archive containing a file with a path traversal sequence (e.g., &ldquo;../../ malicious.exe&rdquo;) in its filename.</li>
<li>The attacker uploads the crafted ZIP archive to the SimpleHelp server through a file upload functionality available to administrators.</li>
<li>The SimpleHelp server extracts the contents of the ZIP archive without proper validation of the file paths.</li>
<li>The file with the path traversal sequence is extracted to an arbitrary location on the file system outside of the intended upload directory.</li>
<li>The attacker leverages a method to execute the uploaded malicious executable. This could involve overwriting an existing system utility or service executable.</li>
<li>The malicious executable runs with the privileges of the SimpleHelp server user.</li>
<li>The attacker achieves arbitrary code execution on the host, potentially leading to complete system compromise, data exfiltration, or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2024-57728 allows an attacker to execute arbitrary code on the SimpleHelp server with the privileges of the SimpleHelp service account. This can result in a full compromise of the SimpleHelp server, potentially leading to data theft, service disruption, or further lateral movement within the network. The vulnerability affects SimpleHelp installations, and the impact is high due to the potential for complete system takeover.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the mitigations provided by SimpleHelp to patch the vulnerability. Refer to the vendor advisory for instructions: <a href="https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier">https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier</a></li>
<li>Monitor SimpleHelp server file uploads for ZIP archives containing path traversal sequences (e.g., &ldquo;../&rdquo;) in filenames using a file integrity monitoring system (FIM) or endpoint detection and response (EDR) solution. Deploy the &ldquo;Detect SimpleHelp Path Traversal ZIP Upload&rdquo; Sigma rule to identify suspicious ZIP files.</li>
<li>Implement strict access controls and regularly audit administrative access to the SimpleHelp console to prevent unauthorized users from exploiting the vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2024-57728</category><category>path-traversal</category><category>zip-slip</category></item></channel></rss>