CVE-2024-5262
NixOS vulnerability analysis and mitigation

Overview

CVE-2024-5262 is a Files or Directories Accessible to External Parties vulnerability discovered in ProjectDiscovery Interactsh's SMB server component. The vulnerability affects versions from 0.0.6 through 1.1.9. This security flaw was disclosed on June 5, 2024, and allows remote attackers to read and write any files in the directory and subdirectories where the victim runs interactsh-server through anonymous login (ZUSO Advisory).

Technical details

The vulnerability has been assigned a CVSS 4.0 Base Score of 9.3 (Critical) with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N. It is also rated with a CVSS 3.1 Base Score of 9.8 (Critical) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The vulnerability is classified under CWE-552 (Files or Directories Accessible to External Parties) (ZUSO Advisory, NVD).

Impact

The vulnerability allows unauthorized access to read and write any files in the directory and subdirectories where the interactsh-server is running. This could potentially lead to unauthorized access to sensitive information, file manipulation, and system compromise (NVD).

Mitigation and workarounds

The recommended mitigation is to update to Interactsh server version 1.2.0 or later, which contains the fix for this vulnerability. The fix implements better scoping of SMB share permissions (ZUSO Advisory, GitHub PR).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management