CVE-2023-36162
📋 TL;DR
This CSRF vulnerability in ZZCMS allows attackers to trick authenticated administrators into performing unauthorized actions, such as adding new admin accounts. It affects all ZZCMS versions up to and including 2023. Attackers can exploit this to gain administrative privileges on vulnerable systems.
💻 Affected Systems
- ZZCMS
📦 What is this software?
Zzcms by Zzcms
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise where attacker gains administrative access, can modify content, steal data, or deploy malware.
Likely Case
Attacker creates new admin accounts to maintain persistent access and perform unauthorized administrative actions.
If Mitigated
Limited impact with proper CSRF protections and admin awareness, though risk remains if protections are bypassed.
🎯 Exploit Status
Exploitation requires tricking authenticated admin to visit malicious page. Public GitHub issues discuss the vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: http://www.zzcms.net/about/download.html
Restart Required: No
Instructions:
No official patch available. Consider upgrading if vendor releases fix, or implement workarounds.
🔧 Temporary Workarounds
Implement CSRF Tokens
allAdd CSRF protection tokens to admin forms to validate legitimate requests.
Modify adminlist.php to include CSRF tokens in forms and validate them on submission
Restrict Admin Access
allLimit admin panel access to specific IP addresses or networks.
Add IP restrictions in .htaccess or web server configuration for admin directory
🧯 If You Can't Patch
- Implement strict SameSite cookie policies and require re-authentication for sensitive actions.
- Monitor admin activity logs for unauthorized account creation or privilege changes.
🔍 How to Verify
Check if Vulnerable:
Check if adminlist.php lacks CSRF token validation in add function. Review code for missing anti-CSRF measures.
Check Version:
Check ZZCMS version in admin panel or configuration files.
Verify Fix Applied:
Test admin forms to ensure CSRF tokens are present and validated. Attempt CSRF attack to confirm protection.
📡 Detection & Monitoring
Log Indicators:
- Unexpected admin account creation
- Multiple failed login attempts followed by successful admin actions
Network Indicators:
- Requests to adminlist.php with suspicious referrers or without expected CSRF tokens
SIEM Query:
Search for POST requests to adminlist.php from non-admin IPs or with abnormal user-agent patterns.