Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-54453: n/a

0
High
VulnerabilityCVE-2024-54453cvecve-2024-54453
Published: Fri Dec 27 2024 (12/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Kurmi Provisioning Suite before 7.9.0.35, 7.10.x through 7.10.0.18, and 7.11.x through 7.11.0.15. A path traversal vulnerability in the DocServlet servlet allows remote attackers to retrieve any file from the Kurmi web application installation folder, e.g., files such as the obfuscated and/or compiled Kurmi source code.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:21:08 UTC

Technical Analysis

CVE-2024-54453 is a path traversal vulnerability identified in the DocServlet servlet component of Kurmi Provisioning Suite versions before 7.9.0.35, 7.10.x through 7.10.0.18, and 7.11.x through 7.11.0.15. The vulnerability allows remote attackers to manipulate file path parameters to access arbitrary files within the web application’s installation directory. This occurs because the servlet does not properly sanitize or validate user-supplied input used to construct file paths, enabling traversal sequences (e.g., ../) to escape the intended directory boundaries. As a result, attackers can retrieve sensitive files such as configuration files, obfuscated or compiled source code, and other critical data stored on the server. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting its network attack vector, low attack complexity, no required privileges or user interaction, and a high impact on confidentiality without affecting integrity or availability. No patches or exploit code are currently publicly available, but the flaw represents a serious risk due to the sensitive nature of the exposed information and the potential for further exploitation based on the disclosed data.

Potential Impact

The primary impact of CVE-2024-54453 is unauthorized disclosure of sensitive information, which can compromise the confidentiality of the Kurmi Provisioning Suite environment. Exposure of source code or configuration files may enable attackers to discover additional vulnerabilities, develop targeted exploits, or gain insights into the internal workings of the application. This can lead to further attacks such as privilege escalation, data manipulation, or lateral movement within affected networks. Since the vulnerability requires no authentication and can be exploited remotely, it poses a significant risk to organizations relying on Kurmi for provisioning and management tasks. The lack of impact on integrity and availability limits the immediate operational disruption but does not diminish the potential long-term security consequences. Organizations in telecommunications, managed services, or enterprises using Kurmi could face data breaches, intellectual property theft, and compliance violations if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2024-54453, organizations should immediately upgrade Kurmi Provisioning Suite to versions 7.9.0.35 or later, 7.10.x beyond 7.10.0.18, or 7.11.x beyond 7.11.0.15 once patches are released. Until official patches are available, administrators should restrict access to the DocServlet servlet by implementing network-level controls such as IP whitelisting or firewall rules to limit exposure to trusted management networks only. Additionally, web application firewalls (WAFs) can be configured to detect and block path traversal patterns in HTTP requests targeting the servlet. Reviewing and hardening file permissions on the server to prevent unauthorized read access to sensitive files can reduce the impact of successful exploitation. Monitoring web server logs for suspicious requests containing traversal sequences and unusual file access attempts can provide early detection. Finally, organizations should conduct thorough security assessments of their Kurmi deployments and ensure that sensitive files are not unnecessarily stored in web-accessible directories.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-12-02T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bc4b7ef31ef0b55acac

Added to database: 2/25/2026, 9:38:12 PM

Last enriched: 2/28/2026, 3:21:08 AM

Last updated: 4/12/2026, 7:54:17 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses