CVE-2023-45906

8.8 HIGH

📋 TL;DR

Dreamer CMS v4.1.3 contains a CSRF vulnerability in the user addition function at /admin/user/add. This allows attackers to trick authenticated administrators into unknowingly creating new user accounts with arbitrary privileges. Any Dreamer CMS installation using the vulnerable version is affected.

💻 Affected Systems

Products:
  • Dreamer CMS
Versions: v4.1.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with the admin interface accessible and user addition functionality enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers create administrative accounts, gaining full control over the CMS to modify content, install backdoors, or pivot to other systems.

🟠

Likely Case

Attackers create regular user accounts to access sensitive content, post malicious content, or maintain persistence for future attacks.

🟢

If Mitigated

With proper CSRF protections, attackers cannot force user creation, limiting impact to other vulnerabilities requiring authentication.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated admin to visit a malicious page while logged in.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing CSRF protections manually.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF token validation to the /admin/user/add endpoint

Modify Dreamer CMS source code to include and validate CSRF tokens in user addition forms

Restrict Admin Access

all

Limit admin interface access to trusted IP addresses only

Configure web server (e.g., Apache .htaccess or Nginx location blocks) to restrict /admin paths

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block CSRF attempts
  • Require re-authentication for sensitive actions like user creation

🔍 How to Verify

Check if Vulnerable:

Check if Dreamer CMS version is 4.1.3 and if /admin/user/add endpoint lacks CSRF protection

Check Version:

Check CMS configuration files or admin dashboard for version information

Verify Fix Applied:

Test that user addition requests now require valid CSRF tokens

📡 Detection & Monitoring

Log Indicators:

  • Multiple user creation requests from same IP without corresponding form submissions
  • User creation requests missing referrer headers or CSRF tokens

Network Indicators:

  • POST requests to /admin/user/add with suspicious referrers or origins

SIEM Query:

source="web_logs" AND uri="/admin/user/add" AND method="POST" AND (referrer NOT CONTAINS "your-domain.com" OR csrf_token MISSING)

🔗 References

📤 Share & Export