Sploit.io - Search

Product: n-central, version: < 2024.6

CVE-2024-8510

Severity: MEDIUM

Description: N-central is vulnerable to a path traversal that allows unintended access to the Apache Tomcat WEB-INF directory. Customer data is not exposed. This vulnerability is present in all deployments of N-central prior to N-central 2024.6.

CVSS Score: 5.3

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.004510000
  • Percentile: 0.637310000
  • Date: 2026-04-29

ExploitDB

No data available.

HackerOne Data

  • Rank: 9223
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • N-able N-central - Versions: 0

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability CVE-2024-8510 is a path traversal vulnerability affecting N-central, an N-able product. This allows an attacker to access the Apache Tomcat WEB-INF directory, which contains configuration files and potentially other sensitive information. While customer data isn't directly exposed, access to the WEB-INF directory can provide valuable insight into the application's structure and potentially lead to further exploitation. The CVSS score of 5.3 (Medium) indicates a moderate risk. The vulnerability is easily exploitable (Low Attack Complexity, Network Vector, No Privileges Required, No User Interaction), making it a likely target for attackers. The confidentiality impact is Low, as the exposure is limited to files within the WEB-INF directory. Integrity and Availability are currently assessed as None, but further exploitation stemming from the path traversal could potentially impact these. The EPSS score of 0.004510000 suggests a relatively low but non-negligible probability of exploitation in the wild. The business impact is moderate; while a full data breach isn't immediately likely, the vulnerability allows for reconnaissance and potentially escalates to a more significant compromise.

    2. Potential Attack Scenarios
    An attacker could leverage this path traversal vulnerability to gain insight into the N-central application's configuration. The attack vector is network-based, meaning the attacker can exploit the vulnerability remotely. The attack process involves crafting a malicious URL request that includes “../” sequences to navigate out of the intended directory and into the Apache Tomcat WEB-INF directory. For example, a request like `https://ncentralserver/somepage?file=../WEB-INF/web.xml` could successfully retrieve the `web.xml` file. This file contains important configuration details about the web application, including session management settings, filter definitions, and other parameters. Accessing these details could aid the attacker in further reconnaissance or planning more targeted attacks, such as identifying potential injection points or vulnerabilities in other components. A successful attack could reveal information about the application's architecture, making it easier to identify and exploit other weaknesses.

    3. Mitigation Recommendations
    The primary mitigation for CVE-2024-8510 is to upgrade N-central to version 2024.6 or later. This version includes a fix for the path traversal vulnerability. The upgrade process should be conducted following N-able’s recommended procedures, including testing in a non-production environment first. Additionally, organizations should review their N-central configuration to ensure least privilege access is enforced. Monitoring logs for unusual access patterns to the WEB-INF directory can help detect potential exploitation attempts. Further resources include the N-able release notes: https://documentation.n-able.com/N-central/Release_Notes/GA/Content/N-central_2024.6_Release_Notes.htm and the security advisory: https://me.n-able.com/s/security-advisory/aArVy0000000XgjKAE/cve20248510-ncentral-path-traversal. Implement web application firewall (WAF) rules to filter requests containing “../” sequences, providing an additional layer of defense.

    4. Executive Summary
    N-central is affected by a path traversal vulnerability (CVE-2024-8510) that allows attackers to access the application's Apache Tomcat WEB-INF directory. While customer data isn’t directly exposed, this vulnerability provides attackers with valuable information about the application's configuration, potentially leading to further exploitation. The vulnerability is relatively easy to exploit and has a moderate risk level. We recommend upgrading N-central to version 2024.6 as soon as possible to mitigate this risk. Prompt action is important to minimize the potential for reconnaissance and escalation to a more significant security incident. The vulnerability, although not immediately critical, should be prioritized as part of routine security maintenance to maintain the overall security posture of the N-central deployment.