CVE-2022-24789
📋 TL;DR
CVE-2022-24789 is a Server-Side Request Forgery (SSRF) vulnerability in C1 CMS that allows authenticated users to make arbitrary GET requests to internal servers and truncate files to zero size. This can lead to data exfiltration, denial of service, or manipulation of application logic. All C1 CMS installations with authenticated users are affected.
💻 Affected Systems
- C1 CMS
📦 What is this software?
C1 Cms by Orckestra
⚠️ Risk & Real-World Impact
Worst Case
Attacker exfiltrates sensitive internal network data, deletes critical system files causing complete system outage, and manipulates application behavior to gain further access.
Likely Case
Authenticated user (including low-privilege accounts) causes denial of service by deleting application files or accesses internal services that shouldn't be exposed.
If Mitigated
With proper network segmentation and file permission controls, impact limited to specific application components rather than entire system.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once authenticated; CSRF vector makes it easier to trick users.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.12
Vendor Advisory: https://github.com/Orckestra/C1-CMS-Foundation/security/advisories/GHSA-j9c2-gr6m-pp45
Restart Required: Yes
Instructions:
1. Backup your C1 CMS installation and database. 2. Download C1 CMS v6.12 from official repository. 3. Replace existing installation files with patched version. 4. Restart the application and web server. 5. Verify functionality.
🔧 Temporary Workarounds
No official workarounds
allVendor states no known workarounds exist for this vulnerability
🧯 If You Can't Patch
- Implement strict network segmentation to isolate C1 CMS from internal services
- Apply strict file permissions and monitor for unauthorized file modifications
🔍 How to Verify
Check if Vulnerable:
Check C1 CMS version in admin panel or web.config file; versions below 6.12 are vulnerable
Check Version:
Check web.config or admin interface for version information
Verify Fix Applied:
Verify version is 6.12 or higher in admin panel and test SSRF protection mechanisms
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound HTTP requests from C1 CMS server
- Unexpected file truncation operations
- CSRF attempts against authenticated endpoints
Network Indicators:
- C1 CMS server making requests to internal IP ranges
- Unexpected traffic to localhost services from web server
SIEM Query:
source="C1-CMS" AND (dest_ip=10.0.0.0/8 OR dest_ip=172.16.0.0/12 OR dest_ip=192.168.0.0/16 OR dest_ip=127.0.0.1) AND http_method="GET"
🔗 References
- https://github.com/Orckestra/C1-CMS-Foundation/releases/tag/v6.12
- https://github.com/Orckestra/C1-CMS-Foundation/security/advisories/GHSA-j9c2-gr6m-pp45
- https://github.com/Orckestra/C1-CMS-Foundation/releases/tag/v6.12
- https://github.com/Orckestra/C1-CMS-Foundation/security/advisories/GHSA-j9c2-gr6m-pp45