Synopsis
CVE-2024-5988 - Message Type 20 Unauthenticated Remote Code Execution (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
An unauthenticated remote attacker can send a specifically crafted synchronization message of type 20 to execute a Tcl command, which can invoke a local or remote executable under the security context of SYSTEM.
CVE-2024-5989 - Message Type 11 Unauthenticated Database Manipulation (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
An unauthenticated remote attacker can send a specifically crafted synchronization message of type 11 to issue SQL statements to the ThinManager database. For example, the attacker can enable HTTP API and add an API key to the ApiKeys table in the database so that he or she can access protected API URL endpoints.
CVE-2024-5990 - Incomplete fix for CVE-2023-2914
ThinServer.exe v13.1.1.9 addressed the issue by preventing a bad size in many caller functions from being passed to the vulnerable "GetDataFromMsgBody" function. This mitigation, however, is missing in some caller functions. An unauthenticated remote attacker can still exploit the vulnerability by sending crafted messages to a monitor thread within ThinServer.exe.
Note: Certain information regarding proof-of-concepts in this advisory has been redacted at the request of the vendor. Despite this, Tenable maintains a stance in favor of open access to exploit details and vulnerability-related information, as we believe transparent and open discussion in these matters contribute significantly to enhancing the security of our customers and the community at large.
Solution
Apply the relevant vendor-supplied patches found here: https://thinmanager.com/downloads/index.php
Disclosure Timeline
All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.
Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.
For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.
If you have questions or corrections about this advisory, please email [email protected]