CVE-2024-22108
📋 TL;DR
This vulnerability allows unauthenticated attackers to perform SQL injection against GTB Central Console, enabling them to change the administrator password to a known value. This affects all systems running GTB Central Console version 15.17.1-30814.NG, potentially leading to complete system compromise.
💻 Affected Systems
- GTB Central Console
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system takeover, data exfiltration, ransomware deployment, and lateral movement within the network.
Likely Case
Administrative account compromise leading to unauthorized access, configuration changes, and potential data theft.
If Mitigated
Limited impact if proper network segmentation, WAF rules, and authentication controls are in place.
🎯 Exploit Status
Public exploit code and detailed analysis available in the provided references.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not found in provided references
Restart Required: No
Instructions:
No official patch available. Check vendor website for updates and apply immediately when available.
🔧 Temporary Workarounds
Block access to vulnerable endpoint
linuxRestrict access to /ccapi.php using web server configuration or firewall rules
# Apache: RewriteRule ^/ccapi\.php$ - [F,L]
# Nginx: location = /ccapi.php { deny all; }
Implement WAF rules
allAdd SQL injection detection rules for the setTermsHashAction parameter
🧯 If You Can't Patch
- Isolate the GTB Central Console system from internet access and restrict internal network access
- Implement strict monitoring and alerting for authentication events and password changes
🔍 How to Verify
Check if Vulnerable:
Check if GTB Central Console version is 15.17.1-30814.NG and if /ccapi.php is accessible
Check Version:
Check application interface or configuration files for version information
Verify Fix Applied:
Verify version has been updated or that /ccapi.php endpoint is no longer accessible/functional
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /ccapi.php with setTermsHashAction parameter
- Administrator password change events from unexpected sources
Network Indicators:
- SQL injection patterns in HTTP requests to /ccapi.php
- Unauthenticated access attempts to administrative endpoints
SIEM Query:
source="web_logs" AND uri="/ccapi.php" AND (param="setTermsHashAction" OR sql_injection_indicators)