CVE-2021-23264

8.1 HIGH

📋 TL;DR

CVE-2021-23264 allows unauthenticated remote attackers to create, view, and delete search indexes in unprotected crafter-search installations. This affects Crafter CMS deployments where the search component is exposed without authentication. Attackers can manipulate search functionality to disrupt operations or gather sensitive information.

💻 Affected Systems

Products:
  • Crafter CMS
Versions: Versions prior to 3.1.18
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations where crafter-search endpoints are not protected by authentication. Default configurations may be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of search functionality allowing data destruction, service disruption, and potential data exfiltration from search indexes.

🟠

Likely Case

Unauthorized modification or deletion of search indexes causing service degradation and operational impact.

🟢

If Mitigated

No impact if proper authentication controls are implemented on crafter-search endpoints.

🌐 Internet-Facing: HIGH - Unauthenticated remote access to search management functions poses significant risk if exposed to internet.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this, but requires network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP requests to unprotected endpoints can trigger the vulnerability. No special tools required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.18 and later

Vendor Advisory: https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120107

Restart Required: Yes

Instructions:

1. Upgrade to Crafter CMS 3.1.18 or later. 2. Apply the patch from the vendor advisory. 3. Restart the Crafter CMS service. 4. Verify authentication is enabled on crafter-search endpoints.

🔧 Temporary Workarounds

Enable Authentication on Search Endpoints

all

Configure authentication requirements for all crafter-search API endpoints

Configure authentication in Crafter CMS security settings for /api/1/search/* endpoints

Network Access Control

linux

Restrict network access to crafter-search endpoints using firewall rules

iptables -A INPUT -p tcp --dport [crafter-port] -s [trusted-networks] -j ACCEPT
iptables -A INPUT -p tcp --dport [crafter-port] -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate crafter-search from untrusted networks
  • Deploy a web application firewall (WAF) with rules to block unauthorized access to search management endpoints

🔍 How to Verify

Check if Vulnerable:

Attempt unauthenticated HTTP requests to crafter-search endpoints (e.g., GET /api/1/search/index/create) and check if they succeed without credentials.

Check Version:

Check Crafter CMS version in administration panel or via system logs

Verify Fix Applied:

Verify that unauthenticated requests to crafter-search endpoints return authentication errors (401/403) and that the system version is 3.1.18 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated requests to /api/1/search/* endpoints
  • Search index creation/deletion from unauthenticated sources
  • HTTP 200 responses on search management endpoints without auth headers

Network Indicators:

  • Unusual volume of requests to search API endpoints
  • Search index manipulation patterns from external IPs

SIEM Query:

source="crafter.log" AND (uri_path="/api/1/search/*" AND NOT (user!="anonymous" OR auth_success="true"))

🔗 References

📤 Share & Export