Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-22049: CWE-472 External Control of Assumed-Immutable Web Parameter

0
Medium
VulnerabilityCVE-2024-22049cvecve-2024-22049cwe-472
Published: Thu Jan 04 2024 (01/04/2024, 20:19:02 UTC)
Source: CVE Database V5

Description

httparty before 0.21.0 is vulnerable to an assumed-immutable web parameter vulnerability. A remote and unauthenticated attacker can provide a crafted filename parameter during multipart/form-data uploads which could result in attacker controlled filenames being written.

AI-Powered Analysis

AILast updated: 11/29/2025, 04:08:06 UTC

Technical Analysis

CVE-2024-22049 is a vulnerability identified in the httparty Ruby gem, versions prior to 0.21.0, categorized under CWE-472: External Control of Assumed-Immutable Web Parameter. The flaw lies in the handling of the filename parameter in multipart/form-data HTTP uploads. Typically, this parameter is assumed to be immutable or controlled internally by the application, but in this case, an attacker can remotely and without authentication supply a crafted filename. This crafted filename can then be written by the application, potentially overwriting files or creating files with attacker-controlled names. The vulnerability does not directly disclose sensitive information (no confidentiality impact) nor does it cause denial of service (no availability impact), but it compromises the integrity of the file system or application data by allowing unauthorized file writes or overwrites. Exploitation requires no privileges or user interaction, making it easier to exploit if the vulnerable httparty version is used in a web application that accepts file uploads. No public exploits are known at this time, but the vulnerability is rated with a CVSS 3.1 base score of 5.3 (medium severity) due to its moderate impact and ease of exploitation. The root cause is insufficient validation or control over the filename parameter, which is assumed immutable but is externally controllable. This can lead to security issues such as overwriting critical files, injecting malicious files, or bypassing file upload restrictions. The vulnerability was published on January 4, 2024, and no official patch links were provided in the source data, but upgrading to httparty 0.21.0 or later is the recommended fix. Additional security best practices around file upload handling should be applied to mitigate residual risks.

Potential Impact

For European organizations, the impact of CVE-2024-22049 depends on their use of the vulnerable httparty gem in web applications that handle file uploads. Organizations in sectors such as finance, healthcare, e-commerce, and government that rely on Ruby-based web services could face integrity risks if attackers exploit this vulnerability to write or overwrite files with malicious or unauthorized content. This could lead to application malfunction, data corruption, or potential footholds for further attacks if malicious files are introduced. Although confidentiality and availability are not directly impacted, the integrity compromise can undermine trust in the affected systems and cause operational disruptions. The ease of exploitation without authentication increases risk, especially for externally facing applications. European organizations with strict regulatory requirements around data integrity and security (e.g., GDPR mandates) must address this vulnerability promptly to avoid compliance issues and reputational damage. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

1. Upgrade all instances of the httparty gem to version 0.21.0 or later, where this vulnerability is fixed. 2. Implement strict validation and sanitization of all filename parameters received in multipart/form-data uploads to ensure they conform to expected patterns and do not contain path traversal or special characters. 3. Enforce server-side controls to restrict file write locations and prevent overwriting of critical system or application files. 4. Employ application-level whitelisting of allowed file types and names to reduce the attack surface. 5. Monitor file upload endpoints for unusual or suspicious activity, including unexpected filenames or upload patterns. 6. Conduct code reviews and security testing focused on file upload functionality to detect similar assumptions about immutability or control of parameters. 7. Use containerization or sandboxing for file upload handling processes to limit the impact of potential file write abuses. 8. Maintain an inventory of applications using httparty and prioritize patching based on exposure and criticality.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2024-01-04T18:44:53.108Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc2182aa0cae27ff43b

Added to database: 6/3/2025, 2:59:14 PM

Last enriched: 11/29/2025, 4:08:06 AM

Last updated: 12/4/2025, 2:27:31 PM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats