CVE-2020-18458
📋 TL;DR
This CSRF vulnerability in DamiCMS v6.0.6 allows attackers to create unauthorized admin accounts by tricking authenticated administrators into visiting malicious web pages. It affects all DamiCMS v6.0.6 installations with the admin interface accessible. Attackers can gain administrative control of the CMS without needing credentials.
💻 Affected Systems
- DamiCMS
📦 What is this software?
Damicms by Damicms
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the CMS with attacker creating persistent admin accounts, leading to data theft, defacement, or further system compromise.
Likely Case
Attackers create backdoor admin accounts to maintain access, modify content, or steal sensitive data from the CMS.
If Mitigated
Limited impact if CSRF protections are implemented, though the vulnerability still exists in the codebase.
🎯 Exploit Status
Exploitation requires social engineering to trick authenticated admin into visiting malicious page.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://github.com/AutismJH/damicms/issues/5
Restart Required: No
Instructions:
No official patch available. Implement CSRF tokens in admin.php?s=/Admin/doadd endpoint or upgrade if newer version exists.
🔧 Temporary Workarounds
Implement CSRF Protection
allAdd CSRF token validation to the admin account creation endpoint
Modify admin.php to include and validate CSRF tokens for doadd action
Restrict Admin Interface Access
allLimit access to admin interface to specific IP addresses or networks
Add IP-based restrictions in web server configuration or application firewall
🧯 If You Can't Patch
- Implement network segmentation to isolate CMS admin interface
- Use browser extensions that block CSRF attacks and enforce same-origin policies
🔍 How to Verify
Check if Vulnerable:
Check if admin.php?s=/Admin/doadd endpoint accepts POST requests without CSRF token validation
Check Version:
Check CMS version in admin panel or configuration files
Verify Fix Applied:
Test that admin account creation fails without valid CSRF token
📡 Detection & Monitoring
Log Indicators:
- Multiple admin account creation attempts from same session
- Admin account creation from unusual IP addresses
Network Indicators:
- POST requests to admin.php?s=/Admin/doadd without referrer validation
- Cross-origin requests to admin endpoints
SIEM Query:
source="web_logs" AND uri="/admin.php" AND params="s=/Admin/doadd" AND method="POST"