CVE-2024-12666

4.7 MEDIUM

📋 TL;DR

This vulnerability in ClassCMS allows attackers to perform vertical privilege escalation through improper privilege handling in the user management component. Attackers can exploit this remotely to gain administrative privileges. All ClassCMS installations up to version 4.8 are affected.

💻 Affected Systems

Products:
  • ClassCMS
Versions: up to 4.8
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the /admin?do=admin:user:editPost endpoint in the user management component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over the CMS, allowing them to modify content, install malicious plugins, access sensitive data, and potentially compromise the underlying server.

🟠

Likely Case

Attackers gain administrative access to the CMS backend, enabling content manipulation, user account compromise, and potential data exfiltration.

🟢

If Mitigated

Attack is prevented through proper access controls, network segmentation, and monitoring, limiting impact to attempted privilege escalation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires some level of access to the admin interface but detailed public disclosure increases weaponization risk.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Monitor ClassCMS official channels for security updates. 2. Upgrade to version 4.9 or higher when available. 3. Apply any security patches immediately upon release.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit access to the /admin endpoint to trusted IP addresses only

# Apache: RewriteCond %{REMOTE_ADDR} !^192\.168\.1\. [OR]
# Nginx: allow 192.168.1.0/24; deny all;

Disable Vulnerable Endpoint

all

Block access to the specific vulnerable endpoint

# Apache: RewriteRule ^/admin\?do=admin:user:editPost - [F]
# Nginx: location ~* /admin\?do=admin:user:editPost { deny all; }

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ClassCMS instances from critical systems
  • Enable detailed logging and monitoring for privilege escalation attempts on admin endpoints

🔍 How to Verify

Check if Vulnerable:

Check ClassCMS version in admin panel or configuration files. If version is 4.8 or lower, system is vulnerable.

Check Version:

Check ClassCMS configuration files or admin panel for version information

Verify Fix Applied:

After applying workarounds, test if /admin?do=admin:user:editPost endpoint is properly restricted or blocked.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed privilege escalation attempts
  • Unauthorized access to /admin?do=admin:user:editPost
  • Unusual user privilege changes

Network Indicators:

  • Unusual traffic patterns to admin endpoints
  • Requests to /admin?do=admin:user:editPost from unexpected sources

SIEM Query:

source="web_server" AND (uri="/admin?do=admin:user:editPost" OR message="privilege escalation")

🔗 References

📤 Share & Export