CVE-2023-36162

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in ZZCMS allows attackers to trick authenticated administrators into performing unauthorized actions, such as adding new admin accounts. It affects all ZZCMS versions up to and including 2023. Attackers can exploit this to gain administrative privileges on vulnerable systems.

💻 Affected Systems

Products:
  • ZZCMS
Versions: All versions up to and including 2023
Operating Systems: All platforms running ZZCMS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin authentication session to exploit, but default installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attacker gains administrative access, can modify content, steal data, or deploy malware.

🟠

Likely Case

Attacker creates new admin accounts to maintain persistent access and perform unauthorized administrative actions.

🟢

If Mitigated

Limited impact with proper CSRF protections and admin awareness, though risk remains if protections are bypassed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking authenticated admin to visit malicious page. Public GitHub issues discuss the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://www.zzcms.net/about/download.html

Restart Required: No

Instructions:

No official patch available. Consider upgrading if vendor releases fix, or implement workarounds.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF protection tokens to admin forms to validate legitimate requests.

Modify adminlist.php to include CSRF tokens in forms and validate them on submission

Restrict Admin Access

all

Limit admin panel access to specific IP addresses or networks.

Add IP restrictions in .htaccess or web server configuration for admin directory

🧯 If You Can't Patch

  • Implement strict SameSite cookie policies and require re-authentication for sensitive actions.
  • Monitor admin activity logs for unauthorized account creation or privilege changes.

🔍 How to Verify

Check if Vulnerable:

Check if adminlist.php lacks CSRF token validation in add function. Review code for missing anti-CSRF measures.

Check Version:

Check ZZCMS version in admin panel or configuration files.

Verify Fix Applied:

Test admin forms to ensure CSRF tokens are present and validated. Attempt CSRF attack to confirm protection.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected admin account creation
  • Multiple failed login attempts followed by successful admin actions

Network Indicators:

  • Requests to adminlist.php with suspicious referrers or without expected CSRF tokens

SIEM Query:

Search for POST requests to adminlist.php from non-admin IPs or with abnormal user-agent patterns.

🔗 References

📤 Share & Export