CVE-2020-18326
📋 TL;DR
This CSRF vulnerability in Subrion CMS allows remote attackers to create arbitrary administrator accounts without authentication by tricking authenticated administrators into visiting malicious web pages. It affects all Subrion CMS installations running version 4.2.1 that have the Members administrator function enabled. Attackers can gain full administrative control of vulnerable CMS instances.
💻 Affected Systems
- Intelliants Subrion CMS
📦 What is this software?
Subrion Cms by Intelliants
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the CMS with attacker creating persistent admin accounts, leading to data theft, defacement, malware injection, and lateral movement to connected systems.
Likely Case
Attackers create hidden admin accounts to maintain persistent access, modify content, steal sensitive data, or use the CMS as a foothold for further attacks.
If Mitigated
With proper CSRF protections, the attack fails and administrators remain protected from unauthorized account creation attempts.
🎯 Exploit Status
Exploit requires tricking an authenticated administrator into clicking a malicious link or visiting a compromised page.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.2.2 or later
Vendor Advisory: http://subrion.com/forums/threads/subrion-4-2-2-is-available.12468/
Restart Required: No
Instructions:
1. Backup your Subrion CMS installation and database. 2. Download Subrion CMS 4.2.2 or later from the official website. 3. Replace all files with the new version, preserving configuration files. 4. Clear browser cache and cookies. 5. Verify the Members administrator function now has CSRF protection.
🔧 Temporary Workarounds
CSRF Token Implementation
allManually add CSRF tokens to the Members administrator function forms
Modify /admin/members/ PHP files to include CSRF token validation
Disable Members Administrator Function
allTemporarily disable the vulnerable Members function in admin panel
Navigate to Admin Panel > Configuration > disable Members module if possible
🧯 If You Can't Patch
- Implement strict SameSite cookie policies and Content Security Policy headers
- Use browser extensions that block CSRF attempts and require administrator users to log out when not actively using the CMS
🔍 How to Verify
Check if Vulnerable:
Check if running Subrion CMS version 4.2.1 and test if Members admin function accepts requests without CSRF tokens
Check Version:
Check /includes/constants.php for define('IA_VERSION', '4.2.1'); or view version in admin dashboard
Verify Fix Applied:
After updating, verify that POST requests to Members admin function require valid CSRF tokens
📡 Detection & Monitoring
Log Indicators:
- Unexpected administrator account creation events
- Multiple failed login attempts followed by successful admin creation
- POST requests to /admin/members/ without referrer headers
Network Indicators:
- HTTP requests to Members admin endpoints from unexpected sources
- Lack of CSRF tokens in admin form submissions
SIEM Query:
source="web_logs" AND (uri_path="/admin/members/" AND http_method="POST") AND NOT csrf_token=*