NetAlertX 24.7.18 before 24.10.12 allows unauthenticated file reading because an HTTP client can ignore a redirect, and because of factors related to strpos and directory traversal, as exploited in the wild in May 2025. This is related to components/logs.php.
References
Link | Resource |
---|---|
https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/netalertx_file_read.rb | Exploit |
https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/ | Exploit Mitigation Third Party Advisory |
https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/ | Exploit Mitigation Third Party Advisory |
Configurations
History
24 Jun 2025, 20:04
Type | Values Removed | Values Added |
---|---|---|
First Time |
Netalertx netalertx
Netalertx |
|
References | () https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/ - Exploit, Mitigation, Third Party Advisory | |
CPE | cpe:2.3:a:netalertx:netalertx:*:*:*:*:*:*:*:* |
23 Jun 2025, 14:59
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:netalertxnetalertx:*:*:*:*:*:*:*:*:* | |
CWE | CWE-22 | |
First Time |
Netalertxnetalertx
Netalertxnetalertx * |
|
References | () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/netalertx_file_read.rb - Exploit | |
References | () https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/ - Exploit, Third Party Advisory, Mitigation | |
Summary |
|
13 May 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/ - |
13 May 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 May 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-13 16:15
Updated : 2025-06-24 20:04
NVD link : CVE-2024-48766
Mitre link : CVE-2024-48766
CVE.ORG link : CVE-2024-48766
JSON object : View
Products Affected
netalertx
- netalertx