Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-54452: n/a

0
Medium
VulnerabilityCVE-2024-54452cvecve-2024-54452
Published: Fri Dec 27 2024 (12/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Kurmi Provisioning Suite before 7.9.0.35 and 7.10.x through 7.10.0.18. A Directory Traversal and Local File Inclusion vulnerability in the logsSys.do page allows remote attackers (authenticated as administrators) to trigger the display of unintended files. Any file accessible to the Kurmi user account could be displayed, e.g., configuration files with information such as the database password.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:20:55 UTC

Technical Analysis

CVE-2024-54452 is a security vulnerability identified in Kurmi Provisioning Suite, specifically affecting versions before 7.9.0.35 and 7.10.x through 7.10.0.18. The flaw exists in the logsSys.do page, where improper input validation allows an authenticated administrator to perform directory traversal and local file inclusion attacks. By exploiting this vulnerability, an attacker can manipulate file path parameters to access and display arbitrary files on the server that are accessible by the Kurmi user account. This includes sensitive configuration files that may contain critical information such as database credentials. The vulnerability stems from CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), indicating insufficient sanitization of user-supplied input used in file path construction. The attack vector is network-based (remote), requiring administrator-level authentication but no additional user interaction. The vulnerability impacts confidentiality by exposing sensitive data but does not affect system integrity or availability. The CVSS 3.1 base score is 4.9, reflecting a medium severity risk. No public exploits or active exploitation campaigns have been reported to date. The issue highlights the importance of secure coding practices around file handling and input validation in web applications, especially those managing critical provisioning functions in enterprise environments.

Potential Impact

The primary impact of CVE-2024-54452 is unauthorized disclosure of sensitive information, including configuration files that may contain database passwords or other credentials. This can lead to further compromise if attackers leverage exposed credentials to access backend systems or escalate privileges. Although exploitation requires administrator authentication, insider threats or compromised admin accounts could exploit this vulnerability to extract confidential data. The exposure of sensitive configuration details can undermine the security posture of organizations relying on Kurmi Provisioning Suite for managing network or telecommunication infrastructure. While the vulnerability does not directly affect system integrity or availability, the confidentiality breach can facilitate subsequent attacks, including lateral movement or data exfiltration. Organizations worldwide using affected versions may face increased risk of data leakage, regulatory non-compliance, and operational disruption if attackers gain access to sensitive internal files. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in targeted attacks or insider misuse scenarios.

Mitigation Recommendations

To mitigate CVE-2024-54452, organizations should promptly upgrade Kurmi Provisioning Suite to versions 7.9.0.35 or later, or 7.10.0.19 or later, where the vulnerability is addressed. If immediate patching is not feasible, restrict administrative access to the logsSys.do page using network segmentation, firewall rules, or VPN access controls to limit exposure to trusted personnel only. Implement strict monitoring and logging of administrator activities to detect any unusual file access attempts. Review and harden file permissions for the Kurmi user account to minimize accessible sensitive files. Employ web application firewalls (WAFs) with custom rules to detect and block directory traversal patterns targeting the logsSys.do endpoint. Conduct regular security audits and code reviews focusing on input validation and file handling mechanisms. Educate administrators on the risks of credential compromise and enforce strong authentication methods, such as multi-factor authentication, to reduce the likelihood of account takeover. Finally, maintain an incident response plan to quickly address any suspected exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-12-02T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bc4b7ef31ef0b55aca8

Added to database: 2/25/2026, 9:38:12 PM

Last enriched: 2/28/2026, 3:20:55 AM

Last updated: 4/12/2026, 7:55:50 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses