CVE-2018-17366

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in MCMS 4.6.5 allows attackers to create unauthorized administrator accounts by tricking authenticated users into visiting malicious web pages. It affects all MCMS installations running version 4.6.5 that have the administrator interface exposed. Attackers can gain full administrative control of the CMS without needing credentials.

💻 Affected Systems

Products:
  • MCMS (MingSoft Content Management System)
Versions: 4.6.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the default installation. Requires administrator interface to be accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the CMS with attacker creating persistent admin accounts, defacing websites, stealing data, and deploying malware to visitors.

🟠

Likely Case

Attackers create hidden admin accounts to maintain persistent access, modify content, or install backdoors for future exploitation.

🟢

If Mitigated

With proper CSRF protections and network segmentation, impact is limited to unauthorized account creation attempts that can be detected and remediated.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated administrator to visit a malicious page. No authentication bypass needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.6.6 or later

Vendor Advisory: https://gitee.com/mingSoft/MCMS/issues/IM1DA

Restart Required: No

Instructions:

1. Backup current installation. 2. Download MCMS 4.6.6 or later from official repository. 3. Replace affected files. 4. Verify CSRF tokens are implemented in ms/basic/manager/save.do endpoint.

🔧 Temporary Workarounds

CSRF Protection Implementation

all

Manually add CSRF token validation to the vulnerable endpoint

Implement anti-CSRF tokens in ms/basic/manager/save.do controller

Access Restriction

all

Restrict access to administrator interface to trusted IP addresses only

Configure firewall/ACL to limit access to /ms/basic/manager/* paths

🧯 If You Can't Patch

  • Implement web application firewall with CSRF protection rules
  • Monitor administrator account creation logs and set alerts for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check if MCMS version is 4.6.5 and examine ms/basic/manager/save.do endpoint for CSRF token validation

Check Version:

Check MCMS version in admin panel or examine version files in installation directory

Verify Fix Applied:

Test that ms/basic/manager/save.do endpoint now requires valid CSRF token and verify version is 4.6.6+

📡 Detection & Monitoring

Log Indicators:

  • Unexpected administrator account creation
  • Multiple failed login attempts followed by account creation
  • POST requests to /ms/basic/manager/save.do without referrer headers

Network Indicators:

  • Unusual traffic patterns to administrator endpoints
  • Requests from unexpected sources to account creation endpoints

SIEM Query:

source="web_logs" AND (uri="/ms/basic/manager/save.do" AND method="POST") AND NOT (referrer CONTAINS "expected-domain")

🔗 References

📤 Share & Export