CVE-2024-57727
SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- January 09, 2025
- Published Date
- January 15, 2025
- Last Updated
- June 06, 2025
- Vendor
- n/a
- Product
- n/a
- Description
- SimpleHelp remote support software v5.5.7 and before is vulnerable to multiple path traversal vulnerabilities that enable unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files include server configuration files containing various secrets and hashed user passwords.
- Tags
- Exploitation
- active
- Automatable
- Yes
- Technical Impact
- total
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
SSVC Information
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2025-02-13 00:00:00 UTC |
Recent Mentions
DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints
Source: TheHackerNews • Published: 2025-05-29 10:34:00 UTC
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-57727.yaml | 2025-04-26 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
imjdl/CVE-2024-57727
Type: github • Created: 2025-01-17 15:45:51 UTC • Stars: 12
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Proof of Concept Exploit Available
-
Added to KEVIntel
-
Detected by Nuclei