CVE-2023-45904

8.8 HIGH

📋 TL;DR

Dreamer CMS v4.1.3 contains a CSRF vulnerability in the variable management modification function at /variable/update. This allows attackers to trick authenticated administrators into performing unauthorized actions like modifying system variables. All users running the vulnerable version are affected.

💻 Affected Systems

Products:
  • Dreamer CMS
Versions: v4.1.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with authenticated administrator access. The vulnerability requires an authenticated session to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify critical system variables, potentially altering site configuration, enabling backdoors, or compromising the entire CMS installation.

🟠

Likely Case

Attackers modify less critical variables to deface websites, inject malicious content, or disrupt normal CMS operations.

🟢

If Mitigated

With proper CSRF protections, no unauthorized actions can be performed even if users are tricked into clicking malicious links.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks are well-understood and easy to weaponize. The GitHub reference contains technical details about the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available, or implement CSRF protection manually.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF token validation to the /variable/update endpoint

Modify the variable update function to include and validate CSRF tokens

Use SameSite Cookies

all

Configure session cookies with SameSite=Strict attribute

Set session cookie attributes: SameSite=Strict; Secure; HttpOnly

🧯 If You Can't Patch

  • Restrict access to the admin interface using network controls or VPN
  • Implement additional authentication factors for administrative actions

🔍 How to Verify

Check if Vulnerable:

Check if Dreamer CMS version is 4.1.3 and if /variable/update endpoint lacks CSRF protection

Check Version:

Check CMS version in admin panel or configuration files

Verify Fix Applied:

Test if /variable/update endpoint now requires and validates CSRF tokens

📡 Detection & Monitoring

Log Indicators:

  • Multiple variable update requests from different IPs in short time
  • Variable updates without corresponding admin login events

Network Indicators:

  • POST requests to /variable/update without Referer header validation
  • Suspicious external domains making requests to admin endpoints

SIEM Query:

source="web_logs" AND uri="/variable/update" AND NOT referer="*admin*"

🔗 References

📤 Share & Export