CVE-2023-0963

7.3 HIGH

📋 TL;DR

This vulnerability in SourceCodester Music Gallery Site 1.0 allows attackers to bypass access controls via the Users.php file's POST request handler. Attackers can potentially perform unauthorized actions remotely. Anyone using this specific version of the software is affected.

💻 Affected Systems

Products:
  • SourceCodester Music Gallery Site
Versions: 1.0
Operating Systems: Any
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Users.php component handling POST requests. No specific OS requirements.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could gain administrative privileges, modify user data, delete content, or take full control of the application.

🟠

Likely Case

Unauthorized access to user management functions, potentially allowing privilege escalation or data manipulation.

🟢

If Mitigated

Proper access controls would prevent any unauthorized actions, limiting impact to legitimate users only.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and public exploits exist.
🏢 Internal Only: MEDIUM - Still exploitable by internal attackers but requires network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub. The vulnerability is in access control logic, making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: No

Instructions:

1. Check vendor website for updates. 2. If no patch, implement workarounds. 3. Consider replacing with alternative software.

🔧 Temporary Workarounds

Implement Proper Access Controls

all

Manually add authentication and authorization checks to Users.php POST handlers

Edit Users.php to include session validation and role checks before processing requests

Web Application Firewall Rules

all

Block suspicious POST requests to Users.php

WAF rule: Block POST requests to */Users.php without valid session tokens

🧯 If You Can't Patch

  • Remove or restrict access to the Music Gallery Site application
  • Implement network segmentation to isolate the vulnerable system

🔍 How to Verify

Check if Vulnerable:

Test if unauthorized POST requests to Users.php endpoints succeed without proper authentication

Check Version:

Check application version in admin panel or configuration files

Verify Fix Applied:

Verify that unauthorized POST requests to Users.php are properly rejected with authentication errors

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful POST to Users.php
  • Unusual user privilege changes

Network Indicators:

  • POST requests to Users.php from unexpected IP addresses
  • Unusual traffic patterns to user management endpoints

SIEM Query:

source="web_logs" AND uri="/Users.php" AND method="POST" AND (user="anonymous" OR auth_status="failed")

🔗 References

📤 Share & Export