CVE-2021-44949

9.8 CRITICAL

📋 TL;DR

CVE-2021-44949 is an access control vulnerability in glFusion CMS that allows unauthorized access to user management functions via the /public_html/users.php endpoint. This affects all glFusion CMS 1.7.9 installations, potentially allowing attackers to view, modify, or delete user accounts without proper authentication.

💻 Affected Systems

Products:
  • glFusion CMS
Versions: 1.7.9
Operating Systems: All platforms running glFusion
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of glFusion 1.7.9 are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of user accounts including administrative accounts, leading to full system takeover, data exfiltration, or website defacement.

🟠

Likely Case

Unauthorized access to user data, privilege escalation, or account takeover of regular users.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, though the vulnerability still exists.

🌐 Internet-Facing: HIGH - The vulnerability is in a web-accessible endpoint, making internet-facing installations immediately vulnerable to remote attacks.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but require network access, reducing the attack surface compared to internet-facing deployments.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is simple to exploit with direct access to the vulnerable endpoint. Public discussion and proof-of-concept details are available in the GitHub issue.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.10 or later

Vendor Advisory: https://github.com/glFusion/glfusion/issues/487

Restart Required: No

Instructions:

1. Backup your glFusion installation and database. 2. Download glFusion 1.7.10 or later from the official repository. 3. Replace the vulnerable files with the patched version. 4. Verify the fix by testing the /users.php endpoint.

🔧 Temporary Workarounds

Block access to users.php

all

Temporarily block access to the vulnerable endpoint using web server configuration.

# For Apache: add to .htaccess
<Files "users.php">
    Order allow,deny
    Deny from all
</Files>
# For Nginx: add to server block
location ~ /users\.php$ {
    deny all;
    return 403;
}

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access the glFusion instance.
  • Deploy a web application firewall (WAF) with rules to block unauthorized access to /users.php.

🔍 How to Verify

Check if Vulnerable:

Attempt to access /public_html/users.php without authentication. If you can access user management functions, the system is vulnerable.

Check Version:

Check the version.php file in your glFusion installation or look at the admin panel version information.

Verify Fix Applied:

After patching, attempt to access /public_html/users.php without authentication. You should receive an access denied error or be redirected to login.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to /users.php from unauthenticated users
  • Multiple failed authentication attempts followed by successful access to user management

Network Indicators:

  • HTTP requests to /users.php without proper authentication headers or session cookies

SIEM Query:

source="web_server" AND (url="/users.php" OR url="/public_html/users.php") AND (user="-" OR auth_status="failed")

🔗 References

📤 Share & Export