Cyber Posture

CVE-2024-55415

MediumPublic PoC

Published: 30 January 2025

Published
30 January 2025
Modified
23 May 2025
KEV Added
Patch
CVSS Score 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
EPSS Score 0.5971 98.3th percentile
Risk Priority 47 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-55415 is a medium-severity Path Traversal (CWE-22) vulnerability in Thecontrolgroup Voyager. Its CVSS base score is 5.7 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 1.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 3 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Implements input validation mechanisms at the /admin/compass endpoint to block path traversal payloads and prevent unauthorized file access.

prevent

Remediates the specific path traversal flaw in VoyagerCompassController by applying patches to versions through 1.8.0.

prevent

Enforces logical access controls to restrict authenticated users from traversing directories and accessing sensitive files outside intended paths.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
T1036.008 Masquerade File Type Stealth
Adversaries may masquerade malicious payloads as legitimate files through changes to the payload's formatting, including the file’s signature, extension, icon, and contents.
Why these techniques?

Path traversal (CVE-2024-55415) and arbitrary file write (CVE-2024-55417) in Voyager's admin panel and media upload enable exploitation of public-facing web application for RCE via polyglot web shells masquerading as allowed image files, facilitating privilege escalation.

NVD Description

DevDojo Voyager through 1.8.0 is vulnerable to path traversal at the /admin/compass.

Deeper analysisAI

DevDojo Voyager through version 1.8.0 is affected by CVE-2024-55415, a path traversal vulnerability (CWE-22) exposed at the /admin/compass endpoint. This flaw resides in the VoyagerCompassController component, with vulnerable code observable in the project's GitHub repository at version 1.6, specifically lines 44 and 213. The vulnerability carries a CVSS v3.1 base score of 5.7 (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N), indicating medium severity primarily due to its confidentiality impact.

Exploitation requires network access, low attack complexity, low privileges (such as an authenticated user), and user interaction. An attacker could leverage this to traverse directories and access sensitive files on the server, achieving high confidentiality impact without affecting integrity or availability.

Advisories and analysis, including the SonarSource blog post "The Tainted Voyage: Uncovering Voyager's Vulnerabilities," provide further details on the issue, with direct references to the affected source code lines in the Voyager repository.

Details

CWE(s)

Affected Products

thecontrolgroup
voyager
≤ 1.8.0

CVEs Like This One

CVE-2024-55417Same product: Thecontrolgroup Voyager
CVE-2025-40737Shared CWE-22
CVE-2025-3671Shared CWE-22
CVE-2025-40738Shared CWE-22
CVE-2025-3740Shared CWE-22
CVE-2026-25732Shared CWE-22
CVE-2026-34414Shared CWE-22
CVE-2026-36760Shared CWE-22
CVE-2025-67684Shared CWE-22
CVE-2026-32727Shared CWE-22

References