CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-43373

Critical Severity
J4k0xb
SVRS
70/100

CVSSv3
7.8/10

EPSS
0.00019/1

CVE-2024-43373: An arbitrary file write vulnerability exists in the webcrack module. Processing malicious code, particularly when unpacking bundles and saving on Windows, allows attackers to overwrite files. This path traversal vulnerability lets attackers write arbitrary .js files, potentially hijacking Node.js modules for arbitrary code execution. While the CVSS score is 7.8 (High), the SOCRadar Vulnerability Risk Score (SVRS) of 70 indicates a significant risk, though not critical, warranting prompt attention. Update to version 2.14.1 immediately to mitigate this security risk. This vulnerability is significant because successful exploitation could lead to complete system compromise through malicious code injection.

In The Wild
CVSS:3.1
AV:L
AC:L
PR:N
UI:R
S:U
C:H
I:H
A:H
2024-08-15

2024-08-16
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-43373 is an arbitrary file write vulnerability in the webcrack module, triggered when using the unpack bundles feature in conjunction with the saving feature. An attacker can exploit this to overwrite files on the host system, allowing them to write arbitrary .js files and potentially hijack legitimate Node.js modules for arbitrary code execution.

Key Insights

  • SVRS Score: 30 (Moderate)
  • Exploit Status: Active exploits have been published.
  • CISA Warning: The Cybersecurity and Infrastructure Security Agency (CISA) has warned of the vulnerability, calling for immediate and necessary measures.
  • In The Wild: The vulnerability is actively exploited by hackers.

Mitigation Strategies

  • Update webcrack to version 2.14.1 or later.
  • Restrict access to the webcrack module to authorized users only.
  • Implement input validation to prevent malicious code from being processed.
  • Monitor systems for suspicious activity and take appropriate action if necessary.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-43373 | j4k0xb webcrack up to 2.14.0 on Windows path traversal
vuldb.com2025-03-14
CVE-2024-43373 | j4k0xb webcrack up to 2.14.0 on Windows path traversal | A vulnerability was found in j4k0xb webcrack up to 2.14.0 on Windows. It has been classified as critical. This affects an unknown part. The manipulation leads to path traversal. This vulnerability is uniquely identified as CVE-2024-43373. It is possible to initiate the attack remotely. There is no exploit available. It is recommended to upgrade the affected
vuldb.com
rss
forum
news

Social Media

CVE-2024-43373 webcrack is a tool for reverse engineering javascript. An arbitrary file write vulnerability exists in the webcrack module when processing specifically crafted malici… https://t.co/1Z4WcLPNrc
0
0
2

Affected Software

Configuration 1
TypeVendorProduct
AppJ4k0xbwebcrack

References

ReferenceLink
[email protected]https://github.com/j4k0xb/webcrack/blob/241f9469e6401f3dabc6373233d85a5e76966b54/packages/webcrack/src/unpack/bundle.ts#L79
[email protected]https://github.com/j4k0xb/webcrack/commit/4bc5c6f353012ee7edc2cb39d01a728ab7426999
[email protected]https://github.com/j4k0xb/webcrack/security/advisories/GHSA-ccqh-278p-xq6w
GITHUBhttps://github.com/j4k0xb/webcrack/security/advisories/GHSA-ccqh-278p-xq6w

CWE Details

CWE IDCWE NameDescription
CWE-22Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
CWE-20Improper Input ValidationThe product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence