CVE-2023-37759

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to register administrator accounts in Crypto Currency Tracker (CCT) by sending a specially crafted POST request to the user registration page. Any organization running CCT versions before 9.5 is affected, potentially giving attackers full administrative control over the application.

💻 Affected Systems

Products:
  • Crypto Currency Tracker (CCT)
Versions: All versions before 9.5
Operating Systems: Any OS running CCT
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the user registration functionality and affects all default installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the CCT application with attackers gaining administrative privileges, allowing them to manipulate cryptocurrency data, steal sensitive information, or use the system as a foothold for further attacks.

🟠

Likely Case

Attackers create admin accounts to access sensitive cryptocurrency tracking data, modify application settings, or disrupt legitimate operations.

🟢

If Mitigated

Proper access controls prevent unauthorized admin registration, limiting attackers to standard user privileges if they can still register.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details and proof-of-concept code are publicly available on Packet Storm Security.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.5

Vendor Advisory: https://codecanyon.net/item/crypto-currency-tracker-prices-charts-news-icos-info-and-more/21588008

Restart Required: Yes

Instructions:

1. Download CCT version 9.5 or later from the vendor. 2. Backup your current installation. 3. Replace the existing files with the updated version. 4. Restart the web server or application service.

🔧 Temporary Workarounds

Disable User Registration

all

Temporarily disable the user registration functionality to prevent exploitation.

Modify application configuration to disable registration or block access to registration endpoints

Web Application Firewall Rules

all

Implement WAF rules to block suspicious POST requests to registration endpoints.

Add rule to block POST requests containing admin role parameters

🧯 If You Can't Patch

  • Implement network segmentation to isolate CCT from critical systems
  • Enable detailed logging and monitoring for user registration attempts

🔍 How to Verify

Check if Vulnerable:

Check if CCT version is below 9.5 by reviewing the application version in admin panel or configuration files.

Check Version:

Check the application's admin panel or review the version.txt file in the installation directory.

Verify Fix Applied:

After updating to version 9.5, attempt to register a new user and verify that admin role cannot be assigned during registration.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed registration attempts
  • Successful user registrations with admin role parameters
  • POST requests to registration endpoints with unusual parameters

Network Indicators:

  • HTTP POST requests to /register or similar endpoints containing role=admin parameters
  • Unusual traffic patterns to registration pages

SIEM Query:

source="web_logs" AND (url_path="/register" OR url_path="/user/register") AND http_method="POST" AND (form_data CONTAINS "admin" OR form_data CONTAINS "role=admin")

🔗 References

📤 Share & Export