Cyber Posture

CVE-2024-55415

MediumPublic PoC

Published: 30 January 2025

Published
30 January 2025
Modified
23 May 2025
KEV Added
Patch
CVSS Score 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
EPSS Score 0.5971 98.3th percentile
Risk Priority 47 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may masquerade malicious payloads as legitimate files through changes to the payload's formatting, including the file’s signature, extension, icon, and contents.

Security Summary

DevDojo Voyager through version 1.8.0 is affected by CVE-2024-55415, a path traversal vulnerability (CWE-22) exposed at the /admin/compass endpoint. This flaw resides in the VoyagerCompassController component, with vulnerable code observable in the project's GitHub repository at version 1.6, specifically lines 44 and 213. The vulnerability carries a CVSS v3.1 base score of 5.7 (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N), indicating medium severity primarily due to its confidentiality impact.

Exploitation requires network access, low attack complexity, low privileges (such as an authenticated user), and user interaction. An attacker could leverage this to traverse directories and access sensitive files on the server, achieving high confidentiality impact without affecting integrity or availability.

Advisories and analysis, including the SonarSource blog post "The Tainted Voyage: Uncovering Voyager's Vulnerabilities," provide further details on the issue, with direct references to the affected source code lines in the Voyager repository.

Details

CWE(s)
CWE-22

Affected Products

thecontrolgroup
voyager
≤ 1.8.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
T1036.008 Masquerade File Type Stealth
Adversaries may masquerade malicious payloads as legitimate files through changes to the payload's formatting, including the file’s signature, extension, icon, and contents.
Why these techniques?

Path traversal (CVE-2024-55415) and arbitrary file write (CVE-2024-55417) in Voyager's admin panel and media upload enable exploitation of public-facing web application for RCE via polyglot web shells masquerading as allowed image files, facilitating privilege escalation.

References