CVE-2024-22819

8.8 HIGH

📋 TL;DR

FlyCms v1.0 contains a Cross-Site Request Forgery (CSRF) vulnerability in the email template update endpoint. This allows attackers to trick authenticated administrators into performing unauthorized actions, potentially modifying email templates or other system configurations. Only administrators with access to the affected endpoint are vulnerable.

💻 Affected Systems

Products:
  • FlyCms
Versions: v1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with the vulnerable endpoint accessible and administrator accounts with appropriate privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify email templates to include malicious content, potentially leading to phishing campaigns, credential theft, or malware distribution from the legitimate domain.

🟠

Likely Case

Unauthorized modification of email templates, potentially disrupting legitimate email communications or inserting malicious links.

🟢

If Mitigated

With proper CSRF protections, the vulnerability would be prevented as requests would require valid anti-CSRF tokens.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks typically require social engineering to trick authenticated users into clicking malicious links.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Consider implementing CSRF protection manually or upgrading to a newer version if available.

🔧 Temporary Workarounds

Implement CSRF Protection

all

Add CSRF tokens to the email template update form and validate them on the server side.

Restrict Access

all

Implement IP whitelisting or additional authentication for the /system/email/email_templets_update endpoint.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block CSRF attempts
  • Educate administrators about phishing risks and implement strict access controls

🔍 How to Verify

Check if Vulnerable:

Check if the /system/email/email_templets_update endpoint lacks CSRF token validation by inspecting the form or testing with a CSRF PoC.

Check Version:

Check FlyCms version in admin panel or configuration files.

Verify Fix Applied:

Verify that CSRF tokens are required and validated for POST requests to the vulnerable endpoint.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /system/email/email_templets_update from unexpected sources
  • Multiple failed CSRF token validations

Network Indicators:

  • HTTP POST requests to the vulnerable endpoint without Referer header validation or CSRF tokens

SIEM Query:

source="web_server" AND (url="/system/email/email_templets_update" AND method="POST") AND NOT (user_agent contains "security_scanner")

🔗 References

📤 Share & Export