Vulnerability Description
BC Security Empire before 5.9.3 is vulnerable to a path traversal issue that can lead to remote code execution. A remote, unauthenticated attacker can exploit this vulnerability over HTTP by acting as a normal agent, completing all cryptographic handshakes, and then triggering an upload of payload data containing a malicious path.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://aceresponder.com/blog/exploiting-empire-c2-framework
- https://github.com/ACE-Responder/Empire-C2-RCE-PoC
- https://github.com/BC-SECURITY/Empire/blob/8283bbc77250232eb493bf1f9104fdd0d4689
- https://vulncheck.com/advisories/empire-unauth-rce
- https://aceresponder.com/blog/exploiting-empire-c2-framework
- https://github.com/ACE-Responder/Empire-C2-RCE-PoC
- https://github.com/BC-SECURITY/Empire/blob/8283bbc77250232eb493bf1f9104fdd0d4689
- https://vulncheck.com/advisories/empire-unauth-rce
FAQ
What is CVE-2024-6127?
CVE-2024-6127 is a vulnerability with a CVSS score of 9.8 (CRITICAL). BC Security Empire before 5.9.3 is vulnerable to a path traversal issue that can lead to remote code execution. A remote, unauthenticated attacker can exploit this vulnerability over HTTP by acting as...
How severe is CVE-2024-6127?
CVE-2024-6127 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-6127?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.