CVE-2024-55555

HIGH

Invoice Ninja <5.10.43 - RCE

Title source: llm

Description

Invoice Ninja before 5.10.43 allows remote code execution from a pre-authenticated route when an attacker knows the APP_KEY. This is exacerbated by .env files, available from the product's repository, that have default APP_KEY values. The route/{hash} route defined in the invoiceninja/routes/client.php file can be accessed without authentication. The parameter {hash} is passed to the function decrypt that expects a Laravel ciphered value containing a serialized object. (Furthermore, Laravel contains several gadget chains usable to trigger remote command execution from arbitrary deserialization.) Therefore, an attacker in possession of the APP_KEY is able to fully control a string passed to an unserialize function.

Exploits (2)

nomisec SCANNER 2 stars
by Yucaerin · poc
https://github.com/Yucaerin/CVE-2024-55555
metasploit WORKING POC EXCELLENT
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/invoiceninja_unauth_rce_cve_2024_55555.rb

Scores

CVSS v3 8.8
EPSS 0.3945
EPSS Percentile 97.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-502
Status draft

Timeline

Published Jan 07, 2025
Tracked Since Feb 18, 2026