CVE-2024-57452
Published: 03 February 2025
Summary
CVE-2024-57452 is a high-severity Files or Directories Accessible to External Parties (CWE-552) vulnerability in 1000Mz Chestnutcms. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique File Deletion (T1070.004); ranked at the 42.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for access to system resources like the FileController, preventing unauthenticated arbitrary file and folder deletions.
Requires timely identification, reporting, and correction of flaws such as the arbitrary file deletion vulnerability in ChestnutCMS.
Applies least privilege to processes including the web application controller, limiting the scope of files and folders that can be deleted even if access is gained.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file/folder deletion directly enables File Deletion (T1070.004) for indicator removal and Data Destruction (T1485) for integrity/availability impact on a public-facing app.
NVD Description
ChestnutCMS <=1.5.0 has an arbitrary file deletion vulnerability in contentcore.controller.FileController, which allows attackers to delete any file and folder.
Deeper analysisAI
CVE-2024-57452 is an arbitrary file deletion vulnerability affecting ChestnutCMS versions up to and including 1.5.0. The issue resides in the contentcore.controller.FileController component, enabling attackers to delete any file or folder on the server. It has been assigned a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) and maps to CWE-552 (Files or Directories Accessible to External Parties). The vulnerability was published on 2025-02-03.
Unauthenticated attackers can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation allows deletion of arbitrary files and folders, resulting in high integrity impact but no confidentiality or availability disruption. This could lead to denial of core site functionality, data loss, or further compromise if critical system files are targeted.
Advisories providing further details, including potential mitigation guidance, are available at the referenced Notion pages: https://locrian-lightning-dc7.notion.site/File-Delete-1628e5e2b1a280cfb497de7b8bcff128.
Details
- CWE(s)