Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-39915 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Thruk < 3.16 has an **OS Command Injection** flaw. πŸ“„ When generating PDF reports, it mishandles URL parameters.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-94** (Code Injection). πŸ› The flaw lies in improper handling of URL inputs during PDF generation. πŸ“ The vulnerable script is `/script/html2pdf.sh`. It fails to sanitize inputs before execution.

Q3Who is affected? (Versions/Components)

🏒 **Affected**: **Thruk** by developer **Sven Nierlein** (sni). πŸ“‰ **Versions**: All versions **prior to 3.16**. 🌐 It is an open-source multi-backend monitoring web interface.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Actions**: Authorized users can inject **arbitrary commands**. πŸ–₯️ These execute via `/script/html2pdf.sh`. πŸ”“ **Impact**: High severity (CVSS 9.8).…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Threshold**: **Medium**. πŸ›‘ Requires **Authentication** (PR:L). ⚠️ You must have **report generation access**. 🌍 Attack vector is **Network** (AV:N) with **Low Complexity** (AC:L). No user interaction needed (UI:N).

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exp**: **None listed** in current data. πŸ“‚ `pocs` array is empty. πŸ” However, the GitHub Advisory and Commit links are provided for verification. πŸ•΅οΈβ€β™‚οΈ Wild exploitation is not yet confirmed public.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Check Thruk version (< 3.16). πŸ“„ 2. Look for `/script/html2pdf.sh` script. 🌐 3. Test PDF report generation with malicious URL payloads. πŸ“‘ Use scanners targeting CWE-94 in Thruk modules.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: **Yes**. πŸ“… Published: 2024-07-15. πŸ› οΈ **Patch**: Upgrade to **Thruk 3.16** or later. πŸ”— Reference: GitHub Security Advisory (GHSA-r7gx-h738-4w6f) and Commit 7e7eb25.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: 1. **Restrict Access**: Limit report generation permissions to trusted admins only. πŸ”’ 2. **Network Segmentation**: Isolate the monitoring server. 🚫 3.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. πŸ“ˆ CVSS Score: **9.8** (High). 🚨 Remote Code Execution (RCE) is possible. ⏳ Patch immediately to prevent server takeover. Do not ignore this!