प्लेटफ़ॉर्म
other
घटक
netalertx
में ठीक किया गया
24.10.12
CVE-2024-46506 represents a critical Command Injection vulnerability affecting NetAlertX versions 23.01.14 through 24.10.12. This flaw allows unauthenticated attackers to inject and execute arbitrary commands on the system. The vulnerability stems from a lack of authentication requirements within the savesettings function, specifically impacting settings.php and util.php. A fix is available in version 24.10.12.
The impact of CVE-2024-46506 is severe. An attacker can leverage this vulnerability to gain complete control over a vulnerable NetAlertX instance. This includes executing arbitrary system commands, potentially leading to data exfiltration, system compromise, and lateral movement within the network. The ability to execute commands without authentication significantly broadens the attack surface, making it a high-priority risk. The vulnerability has already been exploited in the wild, indicating an active threat landscape.
CVE-2024-46506 is actively exploited in the wild, as confirmed in May 2025. This significantly elevates the risk associated with this vulnerability. While no specific threat actor groups have been publicly attributed to the exploitation, the ongoing activity underscores the need for immediate remediation. The vulnerability has been published by NVD on 2025-05-13. No KEV listing is currently available.
Organizations deploying NetAlertX, particularly those with exposed management interfaces or lacking robust network segmentation, are at significant risk. Shared hosting environments where multiple users share the same server instance are especially vulnerable, as a compromise of one user's NetAlertX instance could potentially lead to a compromise of the entire server.
• linux / server: Monitor access logs for requests to settings.php and util.php originating from unexpected or unauthorized IP addresses. Look for unusual command-line arguments in these requests.
grep -i 'command injection' /var/log/apache2/access.log• generic web: Use curl to test the settings.php endpoint with a simple command injection payload (e.g., ; ls -la). A successful injection will result in the execution of the command.
curl -X POST -d "param=; ls -la" http://<target>/settings.php• other: Review NetAlertX configuration files for any unusual or unauthorized settings modifications. Examine system logs for suspicious processes or network connections.
disclosure
exploit
एक्सप्लॉइट स्थिति
EPSS
91.48% (100% शतमक)
CISA SSVC
CVSS वेक्टर
The primary mitigation for CVE-2024-46506 is to immediately upgrade NetAlertX to version 24.10.12 or later. If upgrading is not immediately feasible, consider implementing temporary workarounds. Restrict network access to the settings.php and util.php files to only trusted sources. Implement strict input validation and sanitization on all user-supplied data used in the savesettings function. While a WAF might offer some protection, it is not a substitute for patching. After upgrading, verify the fix by attempting to access the settings.php endpoint with a crafted payload designed to trigger command injection; the request should be rejected.
NetAlertX को संस्करण 24.10.12 या बाद के संस्करण में अपडेट करें। यह संस्करण अनधिकृत (unauthenticated) कमांड इंजेक्शन भेद्यता को ठीक करता है। अपडेट आपके सिस्टम पर हमलावरों द्वारा मनमाना (arbitrary) कमांड निष्पादित करने से रोकेगा।
भेद्यता विश्लेषण और गंभीर अलर्ट सीधे आपके ईमेल में।
CVE-2024-46506 is a critical vulnerability allowing unauthenticated command execution in NetAlertX versions 23.01.14–24.10.12 due to a missing authentication check in the settings update process.
You are affected if you are running NetAlertX versions 23.01.14 through 24.10.12 and have not yet upgraded to a patched version.
Upgrade NetAlertX to version 24.10.12 or later to resolve the vulnerability. If immediate upgrade is not possible, implement temporary workarounds like restricting network access to sensitive files.
Yes, CVE-2024-46506 is being actively exploited in the wild, making it a high-priority security concern.
Refer to the official NetAlertX security advisory for detailed information and updates regarding CVE-2024-46506.
अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।