CVE-2024-1115: CWE-78 OS Command Injection in openBI
A vulnerability was found in openBI up to 1.0.8 and classified as critical. This issue affects the function dlfile of the file /application/websocket/controller/Setting.php. The manipulation of the argument phpPath leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252473 was assigned to this vulnerability.
AI Analysis
Technical Summary
CVE-2024-1115 is a critical security vulnerability identified in openBI versions 1.0.0 through 1.0.8. The flaw resides in the dlfile function within the /application/websocket/controller/Setting.php file. Specifically, the vulnerability arises from improper handling of the phpPath argument, which allows an attacker to perform OS command injection. This means that an attacker can inject arbitrary operating system commands through the phpPath parameter, which the application then executes with the privileges of the web server process. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing the risk of exploitation. The CVSS v3.1 base score is 7.3, indicating a high severity level, with the vector string AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L. This means the attack can be launched over the network with low attack complexity, no privileges or user interaction required, and impacts confidentiality, integrity, and availability to a limited extent. Although no public exploits have been reported in the wild yet, the vulnerability details have been disclosed publicly, which raises the risk of imminent exploitation. The CWE-78 classification confirms the root cause as OS command injection, a critical class of vulnerabilities that can lead to full system compromise if exploited successfully.
Potential Impact
For European organizations using openBI versions up to 1.0.8, this vulnerability poses a significant risk. Successful exploitation could allow attackers to execute arbitrary commands on affected servers, potentially leading to unauthorized data access, data manipulation, or disruption of business operations. Given that openBI is a business intelligence platform, compromised systems might expose sensitive corporate data or analytics, impacting confidentiality and business decision-making. The remote and unauthenticated nature of the exploit increases the threat surface, especially for organizations exposing openBI services to the internet or untrusted networks. Additionally, the ability to execute OS commands could be leveraged to pivot within internal networks, escalate privileges, or deploy ransomware or other malware, amplifying the impact. The vulnerability could also affect availability if attackers disrupt services or delete critical files. Overall, the threat could lead to financial losses, reputational damage, and regulatory compliance issues under GDPR if personal data is exposed or mishandled.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately identify and inventory all openBI instances running versions 1.0.0 through 1.0.8. Since no official patch links are provided, organizations should monitor vendor announcements or trusted security advisories for patches or updates addressing CVE-2024-1115. In the interim, organizations should implement strict network-level controls to restrict access to openBI services, limiting exposure to trusted internal networks only. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting the phpPath parameter. Conduct thorough input validation and sanitization on any user-supplied data if custom modifications to openBI are possible. Additionally, run openBI services with the least privilege necessary to limit the impact of potential command execution. Regularly monitor logs for unusual command execution or access patterns. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect OS command injection attempts. Finally, prepare incident response plans to quickly isolate and remediate affected systems if exploitation is detected.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2024-1115: CWE-78 OS Command Injection in openBI
Description
A vulnerability was found in openBI up to 1.0.8 and classified as critical. This issue affects the function dlfile of the file /application/websocket/controller/Setting.php. The manipulation of the argument phpPath leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252473 was assigned to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2024-1115 is a critical security vulnerability identified in openBI versions 1.0.0 through 1.0.8. The flaw resides in the dlfile function within the /application/websocket/controller/Setting.php file. Specifically, the vulnerability arises from improper handling of the phpPath argument, which allows an attacker to perform OS command injection. This means that an attacker can inject arbitrary operating system commands through the phpPath parameter, which the application then executes with the privileges of the web server process. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing the risk of exploitation. The CVSS v3.1 base score is 7.3, indicating a high severity level, with the vector string AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L. This means the attack can be launched over the network with low attack complexity, no privileges or user interaction required, and impacts confidentiality, integrity, and availability to a limited extent. Although no public exploits have been reported in the wild yet, the vulnerability details have been disclosed publicly, which raises the risk of imminent exploitation. The CWE-78 classification confirms the root cause as OS command injection, a critical class of vulnerabilities that can lead to full system compromise if exploited successfully.
Potential Impact
For European organizations using openBI versions up to 1.0.8, this vulnerability poses a significant risk. Successful exploitation could allow attackers to execute arbitrary commands on affected servers, potentially leading to unauthorized data access, data manipulation, or disruption of business operations. Given that openBI is a business intelligence platform, compromised systems might expose sensitive corporate data or analytics, impacting confidentiality and business decision-making. The remote and unauthenticated nature of the exploit increases the threat surface, especially for organizations exposing openBI services to the internet or untrusted networks. Additionally, the ability to execute OS commands could be leveraged to pivot within internal networks, escalate privileges, or deploy ransomware or other malware, amplifying the impact. The vulnerability could also affect availability if attackers disrupt services or delete critical files. Overall, the threat could lead to financial losses, reputational damage, and regulatory compliance issues under GDPR if personal data is exposed or mishandled.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately identify and inventory all openBI instances running versions 1.0.0 through 1.0.8. Since no official patch links are provided, organizations should monitor vendor announcements or trusted security advisories for patches or updates addressing CVE-2024-1115. In the interim, organizations should implement strict network-level controls to restrict access to openBI services, limiting exposure to trusted internal networks only. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns targeting the phpPath parameter. Conduct thorough input validation and sanitization on any user-supplied data if custom modifications to openBI are possible. Additionally, run openBI services with the least privilege necessary to limit the impact of potential command execution. Regularly monitor logs for unusual command execution or access patterns. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect OS command injection attempts. Finally, prepare incident response plans to quickly isolate and remediate affected systems if exploitation is detected.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-31T13:10:13.180Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683879c8182aa0cae2829691
Added to database: 5/29/2025, 3:14:16 PM
Last enriched: 7/8/2025, 1:29:01 AM
Last updated: 7/26/2025, 3:24:27 AM
Views: 9
Related Threats
CVE-2025-8839: Improper Authorization in jshERP
MediumCVE-2025-8862: CWE-201 Insertion of Sensitive Information Into Sent Data in YugabyteDB Inc YugabyteDB
HighCVE-2025-8846: Stack-based Buffer Overflow in NASM Netwide Assember
MediumCVE-2025-8845: Stack-based Buffer Overflow in NASM Netwide Assember
MediumCVE-2025-8844: NULL Pointer Dereference in NASM Netwide Assember
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.