Advisory Details

December 6th, 2024

(Pwn2Own) iXsystems TrueNAS tarfile.extractall Directory Traversal Remote Code Execution Vulnerability

ZDI-24-1643
ZDI-CAN-25626

CVE ID CVE-2024-11944
CVSS SCORE 7.5, AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS iXsystems
AFFECTED PRODUCTS TrueNAS CORE
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of iXsystems TrueNAS devices. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the tarfile.extractall method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root.

ADDITIONAL DETAILS iXsystems has issued an update to correct this vulnerability. More details can be found at:
https://www.truenas.com/docs/core/13.0/gettingstarted/corereleasenotes/#130-u63
DISCLOSURE TIMELINE
  • 2024-11-15 - Vulnerability reported to vendor
  • 2024-12-06 - Coordinated public release of advisory
  • 2024-12-19 - Advisory Updated
CREDIT Daan Keuper, Thijs Alkemade and Khaled Nassar from Computest Sector 7
BACK TO ADVISORIES