Skip to main content

CVE-2024-22851: n/a in n/a

High
VulnerabilityCVE-2024-22851cvecve-2024-22851
Published: Fri Feb 02 2024 (02/02/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

Directory Traversal Vulnerability in LiveConfig before v.2.5.2 allows a remote attacker to obtain sensitive information via a crafted request to the /static/ endpoint.

AI-Powered Analysis

AILast updated: 07/07/2025, 16:42:12 UTC

Technical Analysis

CVE-2024-22851 is a directory traversal vulnerability identified in LiveConfig versions prior to 2.5.2. This vulnerability allows a remote attacker to craft a specially designed request targeting the /static/ endpoint, which can bypass normal access controls and access files outside the intended directory scope. Directory traversal (CWE-22) vulnerabilities occur when user input is not properly sanitized, enabling attackers to navigate the file system hierarchy and retrieve sensitive files. In this case, the vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network (AV:N/AC:L/PR:N/UI:N). The CVSS 3.1 base score is 7.5, indicating a high severity due to the potential for complete confidentiality compromise (C:H), while integrity and availability remain unaffected (I:N/A:N). Although no known exploits are currently reported in the wild, the ease of exploitation and the high impact on confidentiality make this a significant threat. The lack of vendor and product details limits precise identification of affected environments, but the vulnerability is specifically tied to LiveConfig software before version 2.5.2. The absence of patch links suggests that remediation may require vendor engagement or monitoring for forthcoming updates.

Potential Impact

For European organizations using LiveConfig software, this vulnerability poses a substantial risk to the confidentiality of sensitive data. Attackers exploiting this flaw can access configuration files, credentials, or other sensitive information stored on the server, potentially leading to further compromise or data breaches. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, could face regulatory penalties under GDPR if sensitive personal data is exposed. Additionally, the breach of confidential configuration data could facilitate lateral movement within networks or enable attackers to escalate privileges. The remote and unauthenticated nature of the exploit increases the risk of widespread scanning and exploitation attempts, especially in environments where LiveConfig is exposed to the internet without adequate network segmentation or firewall protections.

Mitigation Recommendations

European organizations should immediately verify if they are running vulnerable versions of LiveConfig prior to 2.5.2. In the absence of an official patch, organizations should implement strict network-level controls to restrict access to the /static/ endpoint, ideally limiting it to trusted internal IP addresses or VPN users. Web application firewalls (WAFs) should be configured to detect and block directory traversal patterns in HTTP requests targeting the /static/ path. Additionally, organizations should conduct thorough audits of server file permissions to ensure that sensitive files are not accessible by the web server process beyond what is strictly necessary. Monitoring and logging of access to the /static/ endpoint should be enhanced to detect anomalous requests indicative of exploitation attempts. Finally, organizations should engage with the LiveConfig vendor or community to obtain patches or updates and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6841d069182aa0cae2e88619

Added to database: 6/5/2025, 5:14:17 PM

Last enriched: 7/7/2025, 4:42:12 PM

Last updated: 8/14/2025, 10:56:34 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats