ABB’s ASPECT: When ‘Delete’ Meets Disaster – Beware of Arbitrary File Vanishing Act!
ABB Cylon Aspect 3.08.01 users, beware! This award-winning energy management solution has an arbitrary file deletion vulnerability. Hackers can exploit the ‘file’ parameter in databaseFileDelete.php to delete files faster than you can say ‘Oops, there goes my data!’ Time to patch up or face the delete-a-geddon!

Hot Take:
Looks like ABB Cylon’s Aspect software just took a nose dive into the “oopsie” pool. With its arbitrary file deletion vulnerability, it seems like even your grandma with a flip phone could play “Whac-A-File” on your server. Time for ABB to get their digital mop and clean this mess up before someone deletes the wrong file, like your cherished collection of cat memes.
Key Points:
- ABB Cylon’s Aspect 3.08.01 has a vulnerability allowing arbitrary file deletion.
- The issue lies in the ‘file’ parameter of ‘databaseFileDelete.php’, which is not properly sanitized.
- Unauthenticated attackers can exploit this to delete files using directory traversal sequences.
- Affected systems include NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, and ASPECT-Studio.
- The vulnerability was discovered by Gjoko ‘LiquidWorm’ Krstic and has been assigned CVE-2024-6209.
Deleting Files Faster Than You Can Say “Oops!”
ABB Cylon’s Aspect software, known for its building energy management prowess, just turned into a rogue file terminator. Thanks to a flaw in its ‘databaseFileDelete.php’ script, anyone with internet access and a penchant for destruction could potentially delete files on the server. Why? Because they forgot to properly sanitize inputs. It’s like leaving your front door wide open with a sign saying, “Come on in, delete what you like!”
Not Just Any Files, All Files!
This isn’t just about accidentally deleting your latest PowerPoint presentation. We’re talking about giving unauthorized individuals the keys to your server’s entire kingdom. With a little directory traversal magic, they can navigate through your server’s file system and delete files at will. Think of it as a game of Minesweeper, but with real consequences, where one wrong move can make your server go boom.
The Usual Suspects
The affected products are part of ABB’s NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise, and ASPECT-Studio systems. If you’re using these systems, you might want to put your digital hard hat on and prepare for some serious patching. The vulnerability was identified by the intrepid Gjoko ‘LiquidWorm’ Krstic, who’s probably now enjoying a well-deserved glass of wine after dropping this bombshell.
Tech Specs, for Those Who Speak Geek
For those who enjoy a good tech jargon soup, the vulnerability affects systems running on a variety of GNU/Linux versions (ranging from 2.6.32 to 3.15.10) and several PHP versions (4.4.8 to 7.3.11). The hardware isn’t left out of the party either, with Intel Atom and Xeon processors being part of the vulnerable lineup. It’s a veritable buffet of tech toys just waiting for someone to come along and start hitting the delete key.
What You Can Do
If you’re looking to avoid waking up to a server full of missing files, it’s time to take action. First, patch your systems faster than a cheetah on a caffeine high. Next, consider implementing better input validation and sanity checks on your server scripts. And finally, maybe consider sending Gjoko a thank you note for letting you know about this digital Pandora’s box before someone else found it.