CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-52677

Medium Severity
Hkcms
SVRS
30/100

CVSSv3
9.8/10

EPSS
0.00163/1

CVE-2024-52677 is a critical file upload vulnerability in HkCms version 2.3.2.240702 and earlier. This flaw allows attackers to upload malicious files via the getFileName method in /app/common/library/Upload.php, potentially leading to remote code execution. The SOCRadar Vulnerability Risk Score (SVRS) for CVE-2024-52677 is 30, indicating a moderate risk. While the CVSS score is high at 9.8, the SVRS suggests that, based on real-world threat intelligence, the immediate threat level might be lower than indicated by CVSS alone. However, the presence of the "In The Wild" tag means it has been exploited. Successful exploitation could compromise the entire system. Immediate patching is highly recommended to mitigate risks associated with this security vulnerability.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:N
UI:N
S:U
C:H
I:H
A:H
2024-11-20

2025-03-13
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-52677 is a vulnerability with a currently unavailable description. However, SOCRadar's SVRS (SOCRadar Vulnerability Risk Score) assigns it a score of 30, indicating a moderate vulnerability. While this score is below the critical threshold of 80, the "In The Wild" tag associated with this CVE signifies that it is actively being exploited by hackers. This means immediate action is crucial to mitigate potential risks.

Key Insights

  • Active Exploitation: The "In The Wild" tag confirms that this vulnerability is actively being exploited by malicious actors. This indicates a high-priority situation that requires immediate attention.
  • Unknown Details: The lack of a detailed description for CVE-2024-52677 highlights the importance of proactive threat intelligence and monitoring. The SVRS score of 30, while not critical, still suggests a potential for significant impact.
  • Threat Actor Involvement: Due to the limited information, it is currently unknown which specific threat actors or APT groups are exploiting CVE-2024-52677. Ongoing monitoring and analysis are necessary to identify potential perpetrators.
  • Potential Impact: While the extent of the impact is unknown, the active exploitation indicates the vulnerability's potential to be exploited for malicious purposes, including data theft, system compromise, or denial of service attacks.

Mitigation Strategies

  • Urgent Patching: Prioritize patching affected systems with the latest security updates as soon as they become available. This should be treated as a high-priority task, given the vulnerability's active exploitation status.
  • Enhanced Monitoring: Increase network and system monitoring for any suspicious activity, focusing on potential indicators of compromise related to CVE-2024-52677. This includes analyzing logs, network traffic, and system behavior.
  • Threat Intelligence: Leverage threat intelligence resources, including SOCRadar's expertise, to stay updated on the latest information about CVE-2024-52677, its exploitation methods, and associated threat actors.
  • Security Awareness Training: Reinforce security awareness among users, emphasizing the importance of staying vigilant against phishing attacks, suspicious links, and other potential attack vectors.

Additional Information

For more information regarding CVE-2024-52677 and its potential impact, you can utilize the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

No news found for this CVE

Social Media

No tweets found for this CVE

Affected Software

Configuration 1
TypeVendorProduct
AppHkcmshkcms

References

ReferenceLink
[email protected]https://github.com/J-0k3r/CVE-2024-52677
[email protected]https://github.com/J-0k3r/test/blob/main/upload.pdf
134C704F-9B21-4F2E-91B3-4A467353BCC0https://github.com/advisories/ghsa-j27h-7c89-c3c6
[email protected]https://github.com/J-0k3r/CVE-2024-52677
[email protected]https://github.com/J-0k3r/test/blob/main/upload.pdf

CWE Details

CWE IDCWE NameDescription
CWE-434Unrestricted Upload of File with Dangerous TypeThe software allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence