Vulnerabilites related to netalertx - netalertx
CVE-2024-46506 (GCVE-0-2024-46506)
Vulnerability from cvelistv5
Published
2025-05-13 00:00
Modified
2025-05-13 19:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-306 - Missing Authentication for Critical Function
Summary
NetAlertX 23.01.14 through 24.x before 24.10.12 allows unauthenticated command injection via settings update because function=savesettings lacks an authentication requirement, as exploited in the wild in May 2025. This is related to settings.php and util.php.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-46506", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-13T19:09:47.510629Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-13T19:09:51.072Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "NetAlertX", "vendor": "NetAlertX", "versions": [ { "lessThan": "24.10.12", "status": "affected", "version": "23.01.14", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "NetAlertX 23.01.14 through 24.x before 24.10.12 allows unauthenticated command injection via settings update because function=savesettings lacks an authentication requirement, as exploited in the wild in May 2025. This is related to settings.php and util.php." } ], "metrics": [ { "cvssV3_1": { "baseScore": 10, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-13T15:25:03.156Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/" } ], "x_generator": { "engine": "enrichogram 0.0.1" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-46506", "datePublished": "2025-05-13T00:00:00.000Z", "dateReserved": "2024-09-11T00:00:00.000Z", "dateUpdated": "2025-05-13T19:09:51.072Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-32440 (GCVE-0-2025-32440)
Vulnerability from cvelistv5
Published
2025-05-27 21:59
Modified
2025-05-28 13:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-306 - Missing Authentication for Critical Function
Summary
NetAlertX is a network, presence scanner and alert framework. Prior to version 25.4.14, it is possible to bypass the authentication mechanism of NetAlertX to update settings without authentication. An attacker can trigger sensitive functions within util.php by sending crafted requests to /index.php. This issue has been patched in version 25.4.14.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-32440", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-28T13:45:49.387619Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-28T13:45:52.417Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-h4x5-vr54-vjrx" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "NetAlertX", "vendor": "jokob-sk", "versions": [ { "status": "affected", "version": "\u003c 25.4.14" } ] } ], "descriptions": [ { "lang": "en", "value": "NetAlertX is a network, presence scanner and alert framework. Prior to version 25.4.14, it is possible to bypass the authentication mechanism of NetAlertX to update settings without authentication. An attacker can trigger sensitive functions within util.php by sending crafted requests to /index.php. This issue has been patched in version 25.4.14." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306: Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-27T21:59:40.497Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-h4x5-vr54-vjrx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-h4x5-vr54-vjrx" }, { "name": "https://github.com/jokob-sk/NetAlertX/releases/tag/v25.4.14", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/jokob-sk/NetAlertX/releases/tag/v25.4.14" } ], "source": { "advisory": "GHSA-h4x5-vr54-vjrx", "discovery": "UNKNOWN" }, "title": "NetAlertX Vulnerable to Authentication Bypass" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-32440", "datePublished": "2025-05-27T21:59:40.497Z", "dateReserved": "2025-04-08T10:54:58.369Z", "dateUpdated": "2025-05-28T13:45:52.417Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-48952 (GCVE-0-2025-48952)
Vulnerability from cvelistv5
Published
2025-07-04 22:12
Modified
2025-07-08 13:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-697 - Incorrect Comparison
Summary
NetAlertX is a network, presence scanner, and alert framework. Prior to version 25.6.7, a vulnerability in the authentication logic allows users to bypass password verification using SHA-256 magic hashes, due to loose comparison in PHP. In vulnerable versions of the application, a password comparison is performed using the `==` operator at line 40 in front/index.php. This introduces a security issue where specially crafted "magic hash" values that evaluate to true in a loose comparison can bypass authentication. Because of the use of `==` instead of the strict `===`, different strings that begin with 0e and are followed by only digits can be interpreted as scientific notation (i.e., zero) and treated as equal. This issue falls under the Login Bypass vulnerability class. Users with certain "weird" passwords that produce magic hashes are particularly affected. Services relying on this logic are at risk of unauthorized access. Version 25.6.7 fixes the vulnerability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-48952", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-08T13:51:30.455776Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-08T13:51:33.982Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-4p4p-vq2v-9489" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "NetAlertX", "vendor": "jokob-sk", "versions": [ { "status": "affected", "version": "\u003c 25.6.7" } ] } ], "descriptions": [ { "lang": "en", "value": "NetAlertX is a network, presence scanner, and alert framework. Prior to version 25.6.7, a vulnerability in the authentication logic allows users to bypass password verification using SHA-256 magic hashes, due to loose comparison in PHP. In vulnerable versions of the application, a password comparison is performed using the `==` operator at line 40 in front/index.php. This introduces a security issue where specially crafted \"magic hash\" values that evaluate to true in a loose comparison can bypass authentication. Because of the use of `==` instead of the strict `===`, different strings that begin with 0e and are followed by only digits can be interpreted as scientific notation (i.e., zero) and treated as equal. This issue falls under the Login Bypass vulnerability class. Users with certain \"weird\" passwords that produce magic hashes are particularly affected. Services relying on this logic are at risk of unauthorized access. Version 25.6.7 fixes the vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.4, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-697", "description": "CWE-697: Incorrect Comparison", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-04T22:12:54.601Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-4p4p-vq2v-9489", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-4p4p-vq2v-9489" } ], "source": { "advisory": "GHSA-4p4p-vq2v-9489", "discovery": "UNKNOWN" }, "title": "NetAlertX has Password Bypass Vulnerability due to Loose Comparison in PHP" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-48952", "datePublished": "2025-07-04T22:12:54.601Z", "dateReserved": "2025-05-28T18:49:07.585Z", "dateUpdated": "2025-07-08T13:51:33.982Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-48766 (GCVE-0-2024-48766)
Vulnerability from cvelistv5
Published
2025-05-13 00:00
Modified
2025-05-13 19:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-698 - Execution After Redirect (EAR)
Summary
NetAlertX 24.7.18 before 24.10.12 allows unauthenticated file reading because an HTTP client can ignore a redirect, and because of factors related to strpos and directory traversal, as exploited in the wild in May 2025. This is related to components/logs.php.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-48766", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-13T19:50:07.428931Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-13T19:53:28.974Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "NetAlertX", "vendor": "NetAlertX", "versions": [ { "lessThan": "24.10.12", "status": "affected", "version": "24.7.18", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "NetAlertX 24.7.18 before 24.10.12 allows unauthenticated file reading because an HTTP client can ignore a redirect, and because of factors related to strpos and directory traversal, as exploited in the wild in May 2025. This is related to components/logs.php." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-698", "description": "CWE-698 Execution After Redirect (EAR)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-13T16:15:07.342Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/" }, { "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/netalertx_file_read.rb" } ], "x_generator": { "engine": "enrichogram 0.0.1" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2024-48766", "datePublished": "2025-05-13T00:00:00.000Z", "dateReserved": "2024-10-08T00:00:00.000Z", "dateUpdated": "2025-05-13T19:53:28.974Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2025-05-27 22:15
Modified
2025-07-11 18:58
Severity ?
10.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
NetAlertX is a network, presence scanner and alert framework. Prior to version 25.4.14, it is possible to bypass the authentication mechanism of NetAlertX to update settings without authentication. An attacker can trigger sensitive functions within util.php by sending crafted requests to /index.php. This issue has been patched in version 25.4.14.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netalertx:netalertx:*:*:*:*:*:*:*:*", "matchCriteriaId": "391ABCBA-1560-483B-B31A-3C66EF44D8D4", "versionEndExcluding": "25.4.14", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NetAlertX is a network, presence scanner and alert framework. Prior to version 25.4.14, it is possible to bypass the authentication mechanism of NetAlertX to update settings without authentication. An attacker can trigger sensitive functions within util.php by sending crafted requests to /index.php. This issue has been patched in version 25.4.14." }, { "lang": "es", "value": "NetAlertX es un framework de trabajo de alertas, esc\u00e1ner de presencia y red. Antes de la versi\u00f3n 25.4.14, era posible eludir el mecanismo de autenticaci\u00f3n de NetAlertX para actualizar la configuraci\u00f3n sin autenticaci\u00f3n. Un atacante puede activar funciones sensibles dentro de util.php enviando solicitudes manipuladas a /index.php. Este problema se ha corregido en la versi\u00f3n 25.4.14." } ], "id": "CVE-2025-32440", "lastModified": "2025-07-11T18:58:26.233", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 6.0, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-05-27T22:15:21.980", "references": [ { "source": "security-advisories@github.com", "tags": [ "Release Notes" ], "url": "https://github.com/jokob-sk/NetAlertX/releases/tag/v25.4.14" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-h4x5-vr54-vjrx" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Vendor Advisory" ], "url": "https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-h4x5-vr54-vjrx" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "security-advisories@github.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-07-04 23:15
Modified
2025-08-06 17:48
Severity ?
Summary
NetAlertX is a network, presence scanner, and alert framework. Prior to version 25.6.7, a vulnerability in the authentication logic allows users to bypass password verification using SHA-256 magic hashes, due to loose comparison in PHP. In vulnerable versions of the application, a password comparison is performed using the `==` operator at line 40 in front/index.php. This introduces a security issue where specially crafted "magic hash" values that evaluate to true in a loose comparison can bypass authentication. Because of the use of `==` instead of the strict `===`, different strings that begin with 0e and are followed by only digits can be interpreted as scientific notation (i.e., zero) and treated as equal. This issue falls under the Login Bypass vulnerability class. Users with certain "weird" passwords that produce magic hashes are particularly affected. Services relying on this logic are at risk of unauthorized access. Version 25.6.7 fixes the vulnerability.
References
▶ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-4p4p-vq2v-9489 | Exploit, Vendor Advisory | |
134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-4p4p-vq2v-9489 | Exploit, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netalertx:netalertx:*:*:*:*:*:*:*:*", "matchCriteriaId": "CD0B1FF5-743B-4BE2-BF2A-942C62B99DF1", "versionEndExcluding": "25.6.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NetAlertX is a network, presence scanner, and alert framework. Prior to version 25.6.7, a vulnerability in the authentication logic allows users to bypass password verification using SHA-256 magic hashes, due to loose comparison in PHP. In vulnerable versions of the application, a password comparison is performed using the `==` operator at line 40 in front/index.php. This introduces a security issue where specially crafted \"magic hash\" values that evaluate to true in a loose comparison can bypass authentication. Because of the use of `==` instead of the strict `===`, different strings that begin with 0e and are followed by only digits can be interpreted as scientific notation (i.e., zero) and treated as equal. This issue falls under the Login Bypass vulnerability class. Users with certain \"weird\" passwords that produce magic hashes are particularly affected. Services relying on this logic are at risk of unauthorized access. Version 25.6.7 fixes the vulnerability." }, { "lang": "es", "value": "NetAlertX es un framework de red, esc\u00e1ner de presencia y alertas. Antes de la versi\u00f3n 25.6.7, una vulnerabilidad en la l\u00f3gica de autenticaci\u00f3n permit\u00eda a los usuarios eludir la verificaci\u00f3n de contrase\u00f1as mediante hashes m\u00e1gicos SHA-256 debido a una comparaci\u00f3n imprecisa en PHP. En versiones vulnerables de la aplicaci\u00f3n, se realiza una comparaci\u00f3n de contrase\u00f1as mediante el operador `==` en la l\u00ednea 40 de front/index.php. Esto genera un problema de seguridad: valores de \"hash m\u00e1gico\" especialmente manipulados, que se eval\u00faan como verdaderos en una comparaci\u00f3n imprecisa, pueden eludir la autenticaci\u00f3n. Debido al uso de `==` en lugar del estricto `===`, diferentes cadenas que comienzan con 0e y van seguidas solo de d\u00edgitos pueden interpretarse como notaci\u00f3n cient\u00edfica (es decir, cero) y tratarse como iguales. Este problema se enmarca en la vulnerabilidad de omisi\u00f3n de inicio de sesi\u00f3n. Los usuarios con ciertas contrase\u00f1as \"extra\u00f1as\" que generan hashes m\u00e1gicos se ven especialmente afectados. Los servicios que dependen de esta l\u00f3gica corren el riesgo de acceso no autorizado. La versi\u00f3n 25.6.7 corrige esta vulnerabilidad." } ], "id": "CVE-2025-48952", "lastModified": "2025-08-06T17:48:07.287", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.4, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.5, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2025-07-04T23:15:21.760", "references": [ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-4p4p-vq2v-9489" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/jokob-sk/NetAlertX/security/advisories/GHSA-4p4p-vq2v-9489" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-697" } ], "source": "security-advisories@github.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-05-13 16:15
Modified
2025-06-24 20:04
Severity ?
Summary
NetAlertX 24.7.18 before 24.10.12 allows unauthenticated file reading because an HTTP client can ignore a redirect, and because of factors related to strpos and directory traversal, as exploited in the wild in May 2025. This is related to components/logs.php.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/netalertx_file_read.rb | Exploit | |
cve@mitre.org | https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/ | Exploit, Mitigation, Third Party Advisory | |
134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/ | Exploit, Mitigation, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netalertx:netalertx:*:*:*:*:*:*:*:*", "matchCriteriaId": "F227D5E6-2F6A-46A0-90E6-80807725DDAB", "versionEndExcluding": "24.10.12", "versionStartIncluding": "24.7.18", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NetAlertX 24.7.18 before 24.10.12 allows unauthenticated file reading because an HTTP client can ignore a redirect, and because of factors related to strpos and directory traversal, as exploited in the wild in May 2025. This is related to components/logs.php." }, { "lang": "es", "value": "NetAlertX 24.7.18 anterior a 24.10.12 permite la lectura de archivos no autenticados porque un cliente HTTP puede ignorar una redirecci\u00f3n y debido a factores relacionados con strpos y el directory traversal, como se explot\u00f3 en la naturaleza en mayo de 2025. Esto est\u00e1 relacionado con components/logs.php." } ], "id": "CVE-2024-48766", "lastModified": "2025-06-24T20:04:07.863", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "cve@mitre.org", "type": "Secondary" } ] }, "published": "2025-05-13T16:15:23.717", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/netalertx_file_read.rb" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-698" } ], "source": "cve@mitre.org", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-05-13 16:15
Modified
2025-06-17 19:39
Severity ?
Summary
NetAlertX 23.01.14 through 24.x before 24.10.12 allows unauthenticated command injection via settings update because function=savesettings lacks an authentication requirement, as exploited in the wild in May 2025. This is related to settings.php and util.php.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/ | Exploit, Third Party Advisory | |
134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/ | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netalertx:netalertx:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A0F056B-1131-4BB9-892D-08FECBD0852F", "versionEndExcluding": "24.10.12", "versionStartIncluding": "23.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "NetAlertX 23.01.14 through 24.x before 24.10.12 allows unauthenticated command injection via settings update because function=savesettings lacks an authentication requirement, as exploited in the wild in May 2025. This is related to settings.php and util.php." }, { "lang": "es", "value": "NetAlertX 23.01.14 a 24.x antes de 24.10.12 permite la inyecci\u00f3n de comandos no autenticados a trav\u00e9s de la actualizaci\u00f3n de la configuraci\u00f3n porque function=savesettings carece de un requisito de autenticaci\u00f3n, como se explot\u00f3 en la naturaleza en mayo de 2025. Esto est\u00e1 relacionado con settings.php y util.php." } ], "id": "CVE-2024-46506", "lastModified": "2025-06-17T19:39:38.983", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 6.0, "source": "cve@mitre.org", "type": "Secondary" } ] }, "published": "2025-05-13T16:15:23.527", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "cve@mitre.org", "type": "Secondary" } ] }