CVE-2022-29647

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in MCMS 5.2.7 allows attackers to create unauthorized administrator accounts by tricking authenticated users into visiting malicious web pages. It affects all MCMS 5.2.7 installations with the vulnerable endpoint exposed. Attackers can gain administrative control of the content management system.

💻 Affected Systems

Products:
  • MCMS
Versions: 5.2.7
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the vulnerable endpoint ms/basic/manager/save.do to be accessible and an authenticated user to be tricked into visiting a malicious page.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the MCMS instance with attacker creating persistent admin accounts, leading to data theft, defacement, or further system compromise.

🟠

Likely Case

Unauthorized admin account creation allowing content manipulation, user data access, and potential privilege escalation within the application.

🟢

If Mitigated

Limited impact with proper CSRF protections and access controls preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick authenticated users but is technically simple with public proof-of-concept available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Implement CSRF Protection

all

Add CSRF tokens to the vulnerable endpoint ms/basic/manager/save.do and validate them on the server side.

Restrict Access to Admin Endpoints

all

Configure web server or application firewall to restrict access to ms/basic/manager/save.do endpoint to trusted IP addresses only.

🧯 If You Can't Patch

  • Implement strict access controls and network segmentation to limit exposure of the MCMS admin interface.
  • Deploy a web application firewall with CSRF protection rules and monitor for suspicious admin account creation attempts.

🔍 How to Verify

Check if Vulnerable:

Check if MCMS version is 5.2.7 and the endpoint ms/basic/manager/save.do is accessible without CSRF protection.

Check Version:

Check MCMS configuration files or admin interface for version information.

Verify Fix Applied:

Test that CSRF tokens are required and validated for the save.do endpoint, and unauthorized admin creation attempts fail.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected admin account creation events
  • Multiple failed login attempts followed by successful admin creation
  • Access to ms/basic/manager/save.do from unusual IP addresses

Network Indicators:

  • HTTP POST requests to ms/basic/manager/save.do without proper referrer headers or CSRF tokens
  • Traffic patterns showing admin interface access from unexpected sources

SIEM Query:

source="web_logs" AND (url="*/ms/basic/manager/save.do" OR event="admin_account_created") AND NOT user="authorized_admin"

🔗 References

📤 Share & Export