Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-55457 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Directory Traversal in MasterSAM Star Gate v11. <br>πŸ’₯ **Consequences**: Attackers can read **arbitrary files** from the server via the `/adama/adama/downloadService` endpoint.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Lack of **path validation** on the `file` parameter. <br>πŸ” **CWE**: CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). The app fails to sanitize user input before accessing files.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: MasterSAM Star Gate **Version 11**. <br>🏒 **Vendor**: MasterSAM. <br>⚠️ **Component**: The `downloadService` API used for troubleshooting logs.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hackers Can**: Access **any file** on the server filesystem. <br>πŸ“‚ **Data Risk**: Read logs, configs, or sensitive credentials. <br>πŸ”“ **Privilege**: No authentication required to exploit this specific endpoint.

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **LOW**. <br>πŸ”‘ **Auth**: **None required** (Unauthenticated). <br>βš™οΈ **Config**: Simple GET request manipulation. Easy to trigger for anyone who knows the endpoint.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’» **Public Exp?**: **YES**. <br>πŸ“‚ **PoC**: Available on GitHub (`h13nh04ng/CVE-2024-55457-PoC`). <br>πŸ”Ž **Scanner**: Nuclei templates exist (`projectdiscovery/nuclei-templates`). Wild exploitation is possible.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Send a GET request to `/adama/adama/downloadService?file=../../etc/passwd` (or equivalent for your OS). <br>πŸ“‘ **Scan**: Use Nuclei with the CVE-2024-55457 template.…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: The data does not explicitly mention a patched version number. <br>⏳ **Status**: Published Feb 2025. Check vendor advisories for the latest patch. Mitigation is key if no patch exists.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: **Block** the endpoint `/adama/adama/downloadService` via WAF or firewall. <br>πŸ”’ **Restrict**: Ensure this API requires authentication if possible.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. <br>⚑ **Reason**: Unauthenticated + Public PoC + Critical Data Exposure. <br>πŸš€ **Action**: Patch or mitigate **immediately**. Do not wait.