Skip to the content.

CVE-2024-43660

Arbitrary file download using <redacted>.sh

CVE CVE-2024-43660
Title Arbitrary file download using <redacted>.sh
Case DIVD-2024-00035
Credits
Affected products
Product Affected Unaffected Unknown
Iocharger Iocharger firmware for AC models >= 0 to < 24120701 (custom)
everything else
CVSS
Base score 7.1 - HIGH
Attack Vector NETWORK
Attack Complexity> LOW
Attack Requirements NONE
Privileges Required LOW
Confidentiality Impact
Vulnerable system HIGH Subsequent systems NONE
Integrity Impact
Vulnerable system NONE Subsequent systems NONE
Availability Impact
Vulnerable system NONE Subsequent systems NONE
Safety impact NOT_DEFINED
Automatable YES
Recovery NOT_DEFINED
Value Density NOT_DEFINED
Vulnerability Response effort NOT_DEFINED
Provider Urgency NOT_DEFINED
References
Problem type(s) CWE-552 Files or Directories Accessible to External Parties
Impact(s) CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs
Date published 09 Jan 2025 00:00 UTC
Last modified

Description

The CGI script <redacted>.sh can be used to download any file on the filesystem.

This issue affects Iocharger firmware for AC model chargers beforeversion 24120701.

Likelihood: High, but credentials required.

Impact: Critical – The script can be used to download any file on the filesystem, including sensitive files such as /etc/shadow, the CGI script source code or binaries and configuration files.

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/S:P/AU:Y
CVSS clarification. The attack can be executed over any network connection the station is listening to and serves the web interface (AV:N), and there are no additional security measure sin place that need to be circumvented (AC:L), the attack does not rely on preconditions (AT:N). The attack does require authentication, but the level of authentication is irrelevant (PR:L), it does not require user interaction (UI:N). The confidentiality of all files of the devicd can be compromised (VC:H/VI:N/VA:N). There is no impact on subsequent systems. (SC:N/SI:N/SA:N). While this device is an EV charger handing significant amounts of power, this attack in isolation does not have a safety impact. The attack can be automated (AU:Y).


JSON version.