CVE-2024-55415
Published: 30 January 2025
Summary
CVE-2024-55415 is a medium-severity Path Traversal (CWE-22) vulnerability in Thecontrolgroup Voyager. Its CVSS base score is 5.7 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 1.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Implements input validation mechanisms at the /admin/compass endpoint to block path traversal payloads and prevent unauthorized file access.
Remediates the specific path traversal flaw in VoyagerCompassController by applying patches to versions through 1.8.0.
Enforces logical access controls to restrict authenticated users from traversing directories and accessing sensitive files outside intended paths.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal (CVE-2024-55415) and arbitrary file write (CVE-2024-55417) in Voyager's admin panel and media upload enable exploitation of public-facing web application for RCE via polyglot web shells masquerading as allowed image files, facilitating privilege escalation.
NVD Description
DevDojo Voyager through 1.8.0 is vulnerable to path traversal at the /admin/compass.
Deeper analysisAI
DevDojo Voyager through version 1.8.0 is affected by CVE-2024-55415, a path traversal vulnerability (CWE-22) exposed at the /admin/compass endpoint. This flaw resides in the VoyagerCompassController component, with vulnerable code observable in the project's GitHub repository at version 1.6, specifically lines 44 and 213. The vulnerability carries a CVSS v3.1 base score of 5.7 (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N), indicating medium severity primarily due to its confidentiality impact.
Exploitation requires network access, low attack complexity, low privileges (such as an authenticated user), and user interaction. An attacker could leverage this to traverse directories and access sensitive files on the server, achieving high confidentiality impact without affecting integrity or availability.
Advisories and analysis, including the SonarSource blog post "The Tainted Voyage: Uncovering Voyager's Vulnerabilities," provide further details on the issue, with direct references to the affected source code lines in the Voyager repository.
Details
- CWE(s)