CVE-2024-52363
Published: 17 January 2025
Summary
CVE-2024-52363 is a medium-severity Path Traversal (CWE-22) vulnerability in Ibm Infosphere Information Server. Its CVSS base score is 6.5 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 17.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely application of vendor patches for CVE-2024-52363 directly remediates the directory traversal flaw in IBM InfoSphere Information Server.
Validating URL inputs to reject or sanitize dot-dot sequences (/../) prevents exploitation of the directory traversal vulnerability.
Enforcing access control policies ensures logical access to files is restricted to authorized directories, mitigating unauthorized file disclosure via traversal.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Directory traversal in public-facing server app directly enables remote arbitrary file read (T1005) via exploitation of the exposed application (T1190).
NVD Description
IBM InfoSphere Information Server 11.7 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system.
Deeper analysisAI
CVE-2024-52363 is a directory traversal vulnerability (CWE-22) in IBM InfoSphere Information Server 11.7. Published on 2025-01-17, it enables a remote attacker to navigate directories on the system by sending a specially crafted URL request with "dot dot" sequences (/../), allowing access to arbitrary files.
The vulnerability carries a CVSS v3.1 base score of 6.5 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). A remote attacker with low privileges can exploit it over the network with low complexity and no user interaction required, resulting in high confidentiality impact through unauthorized file disclosure, while integrity and availability remain unaffected.
IBM has issued an advisory at https://www.ibm.com/support/pages/node/7176515 detailing the issue, where practitioners can review recommended patches and mitigation guidance.
Details
- CWE(s)