CVE-2024-57451
Published: 03 February 2025
Summary
CVE-2024-57451 is a high-severity Path Traversal (CWE-22) vulnerability in 1000Mz Chestnutcms. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 25.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of user-supplied path inputs to the getFileList method to block directory traversal sequences like '../'.
Mandates enforcement mechanisms in the FileController to restrict access to only authorized directories, preventing unauthorized traversal.
Applies least privilege to the ChestnutCMS process, limiting its ability to read sensitive system directories even if path traversal succeeds.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Directory traversal in public-facing CMS directly enables T1190 exploitation for unauthenticated remote file/directory access, facilitating T1083 discovery and T1005 data collection from the local system.
NVD Description
ChestnutCMS <=1.5.0 has a directory traversal vulnerability in contentcore.controller.FileController#getFileList, which allows attackers to view any directory.
Deeper analysisAI
CVE-2024-57451 is a directory traversal vulnerability affecting ChestnutCMS versions up to and including 1.5.0. The flaw resides in the contentcore.controller.FileController#getFileList method, enabling attackers to bypass path restrictions and access arbitrary directories on the server. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), classified as High severity and mapped to CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). The vulnerability was published on 2025-02-03.
Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity and no user interaction required. Exploitation allows viewing the contents of any directory on the affected system, resulting in high confidentiality impact by exposing potentially sensitive files, while integrity and availability remain unaffected.
Mitigation details are available in the referenced advisory at https://locrian-lightning-dc7.notion.site/Directory-traversal-1628e5e2b1a280fdb463c2235acc7f75.
Details
- CWE(s)