CVE-2024-12901

5.3 MEDIUM

📋 TL;DR

This vulnerability in FoxCMS allows attackers to bypass authorization controls by manipulating password parameters in the API endpoint. It affects all FoxCMS installations up to version 1.2 that have the vulnerable API component exposed. Remote attackers can potentially gain unauthorized access to system functions.

💻 Affected Systems

Products:
  • FoxCMS
Versions: up to 1.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the API endpoint to be accessible. The vulnerability is in the Site.php controller file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing unauthorized administrative access, data manipulation, or account takeover.

🟠

Likely Case

Unauthorized access to API functions, potentially leading to data exposure or limited privilege escalation.

🟢

If Mitigated

No impact if proper network segmentation and authentication controls prevent access to vulnerable endpoint.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details have been publicly disclosed. The vulnerability involves manipulating password parameters to bypass authorization checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available, or implement workarounds.

🔧 Temporary Workarounds

Disable vulnerable API endpoint

all

Block or disable access to the /app/api/controller/Site.php endpoint

# Web server configuration example for Apache:
<Location "/app/api/controller/Site.php">
    Require all denied
</Location>
# Web server configuration example for Nginx:
location /app/api/controller/Site.php {
    deny all;
}

Implement API authentication

all

Add additional authentication layer before the vulnerable endpoint

# Example .htaccess protection for Apache:
AuthType Basic
AuthName "Restricted Access"
AuthUserFile /path/to/.htpasswd
Require valid-user

🧯 If You Can't Patch

  • Implement network segmentation to isolate FoxCMS from untrusted networks
  • Deploy web application firewall (WAF) rules to block suspicious password parameter manipulation

🔍 How to Verify

Check if Vulnerable:

Check if FoxCMS version is 1.2 or earlier and if /app/api/controller/Site.php endpoint is accessible

Check Version:

Check FoxCMS configuration files or admin panel for version information

Verify Fix Applied:

Test if authorization bypass via password parameter manipulation is no longer possible

📡 Detection & Monitoring

Log Indicators:

  • Unusual API requests to /app/api/controller/Site.php
  • Failed authorization attempts followed by successful access
  • Multiple requests with manipulated password parameters

Network Indicators:

  • HTTP requests to vulnerable endpoint with unusual password parameter values
  • Traffic patterns suggesting authorization bypass attempts

SIEM Query:

source="web_logs" AND uri="/app/api/controller/Site.php" AND (password="*" OR param_contains="password")

🔗 References

📤 Share & Export