Path Traversal Vulnerability in Genie Could Lead to Remote Code Execution
CVE-2024-4701

9.9CRITICAL

Key Information:

Vendor

Netflix

Status
Vendor
CVE Published:
14 May 2024

Badges

👾 Exploit Exists🟡 Public PoC📰 News Worthy

What is CVE-2024-4701?

A path traversal vulnerability exists in Genie, a product by Netflix, that could allow an attacker to manipulate file paths and access restricted files, ultimately leading to remote code execution. This issue affects all versions of Genie prior to 4.3.18, highlighting the importance of updating to mitigate associated risks. Users are advised to review and apply the latest security patches to protect their systems against potential exploits.

Affected Version(s)

Genie 0 <= 4.3.18

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Critical Netflix Genie Bug Opens Big Data Orchestration to RCE

The severe security vulnerability (CVE-2024-4701, CVSS 9.9) gives remote attackers a way to burrow into Netflix's Genie open source platform, which is a treasure trove of information and connections to other internal services.

References

CVSS V3.1

Score:
9.9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • 📰

    First article discovered

  • Vulnerability published

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability Reserved

.