Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-47051 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Mautic < 5.2.3 has a critical flaw in Asset Editing. πŸ“‰ **Consequences**: Attackers achieve **Remote Code Execution (RCE)** and can **delete files** recursively via path traversal.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-23 (Path Traversal)** combined with **Code Injection**.…

Q3Who is affected? (Versions/Components)

🎯 **Affected**: **Mautic** marketing automation software. πŸ“¦ **Version**: All versions **prior to 5.2.3**. πŸ“¦ **Component**: `mautic/core`. ⚠️ If you are running 5.2.2 or older, you are at risk.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Hackers Can**: 1. Execute arbitrary PHP code (RCE). πŸ—‘οΈ 2. Recursively delete ANY directory the web-user can access. πŸ”“ **Privileges**: Limited to web-user permissions, but still catastrophic for data integrity.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Threshold**: **Medium**. 🚫 **Auth Required**: Yes, attacker must be **Authenticated**. 🌐 **Network**: Remote (AV:N). πŸ“‰ **Complexity**: Low (AC:L). No UI interaction needed (UI:N).

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’» **Exploits Available**: Yes! Public PoCs exist on GitHub. πŸ”— [mallo-m/CVE-2024-47051](https://github.com/mallo-m/CVE-2024-47051) demonstrates Authenticated RCE. πŸš€ Wild exploitation is likely given the low complexity.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Check Mautic version (< 5.2.3). πŸ“‚ 2. Inspect `/assets/view/{assetID}` route for file upload capabilities. πŸ“ 3. Look for improper sanitization of file extensions/types in asset editing forms. πŸ“Έ

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes! Upgrade to **Mautic 5.2.3** or later. πŸ›‘οΈ **Official Advisory**: GHSA-73gx-x7r9-77x2. πŸ”„ Patch addresses the sanitization flaws in asset handling.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: 1. **Disable Asset Editing** feature if possible. 🚫 2. Restrict web-user filesystem permissions (least privilege). πŸ”’ 3. Implement WAF rules to block path traversal payloads (`../`) in upload parameters.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. 🚨 CVSS Score indicates High Impact (C:H). πŸ“… Published Feb 2025, PoCs already live. ⚑ Immediate patching or mitigation is strongly recommended to prevent RCE and data loss.