CVE-2024-57784
Published: 16 January 2025
Summary
CVE-2024-57784 is a medium-severity Path Traversal (CWE-22) vulnerability. Its CVSS base score is 5.5 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked in the top 5.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the directory traversal flaw in /php/script_uploads.php through timely patching or code fixes.
Validates and sanitizes user-supplied file paths in the upload script to block directory traversal sequences like ../
Enforces strict access controls on file system operations within the upload component to restrict reads outside the intended directory.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Directory traversal enables arbitrary local file reads (T1005) and supports file/directory enumeration (T1083) via the web app component.
NVD Description
An issue in the component /php/script_uploads.php of Zenitel AlphaWeb XE v11.2.3.10 allows attackers to execute a directory traversal.
Deeper analysisAI
CVE-2024-57784 is a directory traversal vulnerability (CWE-22) in the /php/script_uploads.php component of Zenitel AlphaWeb XE version 11.2.3.10. Published on 2025-01-16, it has a CVSS v3.1 base score of 5.5 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N), rated as medium severity. The flaw enables attackers to traverse directories, potentially accessing sensitive files outside the intended upload path.
Exploitation requires network access and high privileges (PR:H), such as an authenticated administrative user, with low attack complexity and no user interaction needed. Successful exploitation allows high confidentiality impact by reading arbitrary files, limited integrity impact, and no availability disruption, making it a targeted risk for privileged insiders or compromised accounts.
A reference advisory is available at https://gist.github.com/s4fv4n/8cc4e4cb6fd028e803898837b73aa342 for details on the vulnerability, including potential mitigation guidance.
Details
- CWE(s)