CVE-2024-11743

4.3 MEDIUM

📋 TL;DR

This CVE describes a Cross-Site Request Forgery (CSRF) vulnerability in SourceCodester Best House Rental Management System 1.0. Attackers can trick authenticated users into performing unintended actions like deleting user accounts via malicious requests to the /rental/ajax.php endpoint. Organizations using this specific software version are affected.

💻 Affected Systems

Products:
  • SourceCodester Best House Rental Management System
Versions: 1.0
Operating Systems: Any OS running PHP web server
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation of version 1.0. Any system with this software exposed to user access is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could delete all user accounts, disrupt rental operations, and cause data loss by tricking administrators into executing malicious requests.

🟠

Likely Case

Attackers trick users into performing unauthorized actions like deleting their own or other user accounts, leading to service disruption and data loss.

🟢

If Mitigated

With proper CSRF protections, the vulnerability is neutralized and no unauthorized actions can be performed via forged requests.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available on GitHub. Attack requires user authentication but CSRF tokens are not implemented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.sourcecodester.com/

Restart Required: No

Instructions:

No official patch available. Check vendor website for updates or implement CSRF protection manually.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF token validation to all POST requests in the application

Modify PHP files to generate and validate unique tokens per session

SameSite Cookie Attribute

all

Set SameSite=Strict or Lax attributes on session cookies

session.cookie_samesite = Strict in php.ini or setcookie('name', 'value', ['samesite' => 'Strict', 'secure' => true])

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block CSRF patterns
  • Restrict access to the application to trusted networks only and implement strong authentication

🔍 How to Verify

Check if Vulnerable:

Check if /rental/ajax.php?action=delete_user accepts POST requests without CSRF token validation

Check Version:

Check application version in admin panel or configuration files

Verify Fix Applied:

Verify that all POST requests now require and validate CSRF tokens

📡 Detection & Monitoring

Log Indicators:

  • Multiple DELETE_USER actions from same IP/session
  • POST requests to /rental/ajax.php without referrer validation

Network Indicators:

  • HTTP POST requests to vulnerable endpoint from unexpected referrers

SIEM Query:

source="web_logs" AND uri="/rental/ajax.php" AND method="POST" AND action="delete_user" | stats count by src_ip

🔗 References

📤 Share & Export