CVE-2023-24674

7.8 HIGH

📋 TL;DR

CVE-2023-24674 is a privilege escalation vulnerability in Bludit CMS v4.0.0 that allows local attackers to gain administrative privileges by manipulating the role:admin parameter. This affects any Bludit CMS installation running the vulnerable version, potentially compromising the entire content management system.

💻 Affected Systems

Products:
  • Bludit CMS
Versions: v4.0.0
Operating Systems: All platforms running Bludit
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access (authenticated user) to exploit. All installations of Bludit v4.0.0 are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the CMS with administrative access, allowing attackers to modify content, install malicious plugins, access sensitive data, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized administrative access leading to content manipulation, user account compromise, and potential data exfiltration.

🟢

If Mitigated

Limited impact with proper access controls, but still represents a significant security gap that could be exploited by authenticated users.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access. The vulnerability is well-documented with public proof-of-concept available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v4.0.1 or later

Vendor Advisory: https://github.com/bludit/bludit/releases

Restart Required: No

Instructions:

1. Backup your Bludit installation and database. 2. Download the latest version from the official Bludit repository. 3. Replace the vulnerable files with the patched version. 4. Verify the update was successful.

🔧 Temporary Workarounds

Access Restriction

all

Restrict access to the Bludit admin interface to trusted IP addresses only.

# Example for Apache: 
Order deny,allow
Deny from all
Allow from 192.168.1.0/24
# Example for Nginx: 
location /admin/ {
    allow 192.168.1.0/24;
    deny all;
}

🧯 If You Can't Patch

  • Implement strict access controls and monitor admin interface access logs
  • Regularly audit user accounts and remove unnecessary administrative privileges

🔍 How to Verify

Check if Vulnerable:

Check the Bludit version in the admin dashboard or by examining the version.txt file in the installation directory.

Check Version:

cat /path/to/bludit/bl-content/databases/site.php | grep 'version'

Verify Fix Applied:

Verify the version is v4.0.1 or later and test that the role:admin parameter manipulation no longer grants unauthorized privileges.

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin panel access from non-privileged users
  • Multiple failed privilege escalation attempts
  • Suspicious parameter manipulation in logs

Network Indicators:

  • Unusual traffic patterns to admin endpoints
  • Requests containing manipulated role parameters

SIEM Query:

source="bludit_logs" AND (uri_path="/admin/*" AND user_role!="admin")

🔗 References

📤 Share & Export