CVE-2024-25978
Moodle
CVE-2024-25978 poses a denial of service risk due to insufficient file size checks within the file picker's unzip function. This vulnerability, categorized as CWE-400, allows attackers to exploit the system by providing excessively large files. While the CVSS score is 7.5, SOCRadar's Vulnerability Risk Score (SVRS) of 30 indicates a lower immediate risk compared to critical vulnerabilities (SVRS > 80), but it's still important to remediate the vulnerability. Successful exploitation leads to a denial-of-service condition, disrupting system availability. Organizations should apply necessary patches to address the file size check issue. Failure to address this vulnerability leaves systems open to resource exhaustion attacks.
Description
CVE-2024-25978 describes a denial-of-service vulnerability resulting from insufficient file size checks in the file picker's unzip functionality. This allows a malicious actor to craft a specially designed archive that, when processed, could exhaust system resources, leading to a denial of service. While the CVSS score is 7.5 (High), indicating a significant risk, the SOCRadar Vulnerability Risk Score (SVRS) is 30.
Key Insights
- Denial of Service Impact: The primary impact is a denial-of-service (DoS) condition. Attackers can exploit the vulnerability to make the affected system or service unavailable to legitimate users.
- CWE-400 (Uncontrolled Resource Consumption): The vulnerability is classified as CWE-400, indicating that the software does not properly restrict the consumption of resources, allowing an attacker to exhaust available resources.
- Low SVRS: The SVRS of 30 suggests SOCRadar threat intelligence hasn't observed widespread exploitation.
- In The Wild: The vulnerability is actively exploited by hackers.
Mitigation Strategies
- Patch Application: Immediately apply the security patch or update provided by the vendor that addresses the insufficient file size check. This is the most effective way to remediate the vulnerability.
- Input Validation: Implement robust input validation checks on file sizes before processing them within the unzip functionality. Set reasonable upper limits on file sizes to prevent resource exhaustion.
- Resource Monitoring: Implement and monitor resource usage (CPU, memory, disk I/O) on systems where the file picker's unzip functionality is used. Establish alerts for unusual resource spikes that could indicate an ongoing attack.
Additional Information
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.