CVE-2024-55415
Published: 30 January 2025
Description
Adversaries may masquerade malicious payloads as legitimate files through changes to the payload's formatting, including the file’s signature, extension, icon, and contents.
Security Summary
DevDojo Voyager through version 1.8.0 is affected by CVE-2024-55415, a path traversal vulnerability (CWE-22) exposed at the /admin/compass endpoint. This flaw resides in the VoyagerCompassController component, with vulnerable code observable in the project's GitHub repository at version 1.6, specifically lines 44 and 213. The vulnerability carries a CVSS v3.1 base score of 5.7 (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N), indicating medium severity primarily due to its confidentiality impact.
Exploitation requires network access, low attack complexity, low privileges (such as an authenticated user), and user interaction. An attacker could leverage this to traverse directories and access sensitive files on the server, achieving high confidentiality impact without affecting integrity or availability.
Advisories and analysis, including the SonarSource blog post "The Tainted Voyage: Uncovering Voyager's Vulnerabilities," provide further details on the issue, with direct references to the affected source code lines in the Voyager repository.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Path traversal (CVE-2024-55415) and arbitrary file write (CVE-2024-55417) in Voyager's admin panel and media upload enable exploitation of public-facing web application for RCE via polyglot web shells masquerading as allowed image files, facilitating privilege escalation.