BC Security Empire before 5.9.3 is vulnerable to a path traversal issue that can lead to remote code execution. A remote, unauthenticated attacker can exploit this vulnerability over HTTP by acting as a normal agent, completing all cryptographic handshakes, and then triggering an upload of payload data containing a malicious path.
References
Configurations
No configuration.
History
25 Sep 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-434 |
21 Nov 2024, 09:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://aceresponder.com/blog/exploiting-empire-c2-framework - | |
References | () https://github.com/ACE-Responder/Empire-C2-RCE-PoC - | |
References | () https://github.com/BC-SECURITY/Empire/blob/8283bbc77250232eb493bf1f9104fdd0d468962a/CHANGELOG.md?plain=1#L102 - | |
References | () https://vulncheck.com/advisories/empire-unauth-rce - |
28 Jun 2024, 10:27
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-27 20:15
Updated : 2025-09-25 19:15
NVD link : CVE-2024-6127
Mitre link : CVE-2024-6127
CVE.ORG link : CVE-2024-6127
JSON object : View
Products Affected
No product.