Skip to main content

CVE-2024-23770: n/a in n/a

Medium
VulnerabilityCVE-2024-23770cvecve-2024-23770
Published: Mon Jan 22 2024 (01/22/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

darkhttpd through 1.15 allows local users to discover credentials (for --auth) by listing processes and their arguments.

AI-Powered Analysis

AILast updated: 07/08/2025, 19:13:58 UTC

Technical Analysis

CVE-2024-23770 is a medium-severity vulnerability affecting darkhttpd, a lightweight HTTP server, through version 1.15. The vulnerability arises because darkhttpd allows local users to discover credentials used for HTTP authentication (the --auth option) by inspecting the process list and their command-line arguments. Specifically, when darkhttpd is started with authentication enabled, the credentials are passed as command-line parameters, which are visible to any local user who can list processes (e.g., via commands like ps or similar). This exposure leads to a confidentiality breach as sensitive authentication credentials can be easily obtained without requiring elevated privileges beyond local user access. The vulnerability does not affect the integrity or availability of the server, nor does it require user interaction. The CVSS 3.1 base score is 5.5, reflecting a medium severity with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, meaning local attack vector, low attack complexity, requires low privileges, no user interaction, unchanged scope, and high confidentiality impact but no impact on integrity or availability. There are no known exploits in the wild at this time, and no patches or vendor advisories have been linked yet. The vulnerability primarily concerns environments where darkhttpd is used with authentication enabled and where multiple local users have access to the system, potentially exposing credentials to unauthorized local users.

Potential Impact

For European organizations, the impact of CVE-2024-23770 depends largely on the deployment context of darkhttpd. Organizations using darkhttpd in multi-user environments, such as shared servers or development machines, risk unauthorized disclosure of authentication credentials to local users. This can lead to unauthorized access to web services protected by these credentials, potentially exposing sensitive internal resources or data. While the vulnerability does not allow remote exploitation, insider threats or compromised local accounts could leverage this to escalate access. In sectors with strict data protection regulations like GDPR, unauthorized credential disclosure could lead to compliance issues and reputational damage. The impact is more pronounced in organizations with less stringent local user access controls or where darkhttpd is used in production environments with authentication enabled. However, organizations that deploy darkhttpd on isolated or single-user systems face minimal risk. Overall, the confidentiality breach could facilitate lateral movement or privilege escalation within affected networks, increasing the risk of further compromise.

Mitigation Recommendations

To mitigate CVE-2024-23770, European organizations should avoid passing authentication credentials via command-line arguments when running darkhttpd. Instead, credentials should be stored and referenced securely, for example, by using configuration files with strict permissions or environment variables inaccessible to other users. If possible, run darkhttpd under dedicated service accounts with minimal privileges and restrict local user access to the system to trusted personnel only. Employ process hiding or restrict access to process listing commands (e.g., limit use of ps, top, or /proc filesystem permissions) to prevent unauthorized users from viewing process arguments. Additionally, consider using alternative HTTP servers that do not expose credentials in process arguments or that support more secure authentication mechanisms. Regularly audit systems for unauthorized access and monitor for suspicious local user activity. Finally, keep track of vendor updates or patches addressing this vulnerability and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c41d182aa0cae2b4361e

Added to database: 5/30/2025, 2:43:41 PM

Last enriched: 7/8/2025, 7:13:58 PM

Last updated: 8/15/2025, 8:37:55 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats