Sploit.io - Search

Product: s-museum, version: 7.02.3

CVE-2024-25802

Severity: CRITICAL

Description: SKINsoft S-Museum 7.02.3 allows Unrestricted File Upload via the Add Media function. Unlike in CVE-2024-25801, the attack payload is the file content.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.000430000
  • Percentile: 0.110490000
  • Date: 2025-01-07

ExploitDB

No data available.

HackerOne Data

  • Rank: 7440
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • n/a n/a - Versions: n/a

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability identified as CVE-2024-25802 in SKINsoft S-Museum 7.02.3 is a critical security flaw that allows unrestricted file upload via the Add Media function. This vulnerability is classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. The CVSS v3.1 base score of 9.8 (CRITICAL) indicates a high level of risk, with the attack vector being network-based, requiring no user interaction, and having low attack complexity.

    The nature of this vulnerability makes it highly exploitable, as attackers can upload malicious files directly to the system without any restrictions. This could lead to severe consequences, including the compromise of system integrity, confidentiality, and availability. The potential business impact is significant, as attackers could deploy malware, execute arbitrary code, or exfiltrate sensitive data, leading to operational disruptions, reputational damage, and financial losses.

    The likelihood of exploitation is high due to the ease of attack and the lack of required privileges. The vulnerability is automatable, meaning attackers could exploit it at scale with minimal effort. The impact on confidentiality, integrity, and availability is total, as attackers could gain full control over the affected system.

    2. Potential Attack Scenarios
    One potential attack scenario involves an attacker exploiting the unrestricted file upload vulnerability to upload a malicious payload, such as a web shell, to the S-Museum server. The attack vector would begin with the attacker identifying the vulnerable Add Media function in the application. Using a simple HTTP request, the attacker could upload a file containing malicious code, such as a PHP script, disguised as a legitimate media file.

    Once the file is uploaded, the attacker could access the web shell by navigating to the uploaded file's location on the server. This would grant the attacker remote control over the server, enabling them to execute arbitrary commands, exfiltrate sensitive data, or deploy additional malware. The potential outcomes include complete system compromise, data breaches, and prolonged downtime as the organization attempts to remediate the issue.

    3. Mitigation Recommendations
    To mitigate this vulnerability, immediate action is required. The following steps are recommended:

    - Apply the latest patches or updates provided by SKINsoft for S-Museum 7.02.3. If a patch is not yet available, consider temporarily disabling the Add Media function until a fix is released.
    - Implement strict file upload validation mechanisms, including file type verification, size restrictions, and content scanning for malicious code.
    - Deploy a web application firewall (WAF) to detect and block malicious file upload attempts.
    - Conduct a thorough security audit of the affected system to identify and remove any malicious files that may have been uploaded.
    - Monitor network traffic and server logs for unusual activity, such as unauthorized file uploads or access to uploaded files.

    For additional guidance, refer to the following resources:
    - SKINsoft's official advisory or support channels for updates on this vulnerability.
    - CISA's guidance on mitigating file upload vulnerabilities: https://www.cisa.gov/
    - The detailed analysis of the vulnerability: https://shrouded-trowel-50c.notion.site/S-Museum-Version-7-02-3-Unrestricted-File-Upload-b73d4590b024449787464ddcc175b8f7?pvs=4

    4. Executive Summary
    CVE-2024-25802 is a critical vulnerability in SKINsoft S-Museum 7.02.3 that allows attackers to upload malicious files without restrictions. This flaw poses a significant risk to business operations, as it can lead to system compromise, data breaches, and operational disruptions. The vulnerability is highly exploitable, with a CVSS score of 9.8, and requires immediate attention.

    Attackers can exploit this vulnerability to upload malicious payloads, such as web shells, and gain full control over the affected system. This could result in severe financial, operational, and reputational damage. To mitigate this risk, organizations should apply patches, implement strict file upload controls, and monitor for suspicious activity. Addressing this vulnerability promptly is essential to safeguard critical systems and data.