CVE-2024-22938

7.8 HIGH

📋 TL;DR

This vulnerability in BossCMS v1.3.0 allows a local attacker to execute arbitrary code and escalate privileges through insecure permissions in the admin.class.php component's init function. Attackers can gain administrative control over the CMS installation. Only BossCMS v1.3.0 installations are affected.

💻 Affected Systems

Products:
  • BossCMS
Versions: v1.3.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects BossCMS v1.3.0; earlier or later versions may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining root/admin privileges, installing backdoors, stealing data, and using the server for further attacks.

🟠

Likely Case

Attacker gains administrative access to the CMS, modifies content, steals user data, and potentially compromises the underlying server.

🟢

If Mitigated

Attack limited to CMS administrative functions if proper network segmentation and least privilege principles are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local access to the system; exploit details available in public GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.bosscms.net/

Restart Required: No

Instructions:

1. Check BossCMS website for security updates
2. Upgrade to latest version if available
3. If no patch, consider migrating to alternative CMS

🔧 Temporary Workarounds

Restrict File Permissions

linux

Modify permissions on admin.class.php to prevent unauthorized execution

chmod 644 /path/to/admin.class.php
chown root:root /path/to/admin.class.php

Disable Vulnerable Component

all

Temporarily disable or rename the vulnerable admin.class.php file

mv /path/to/admin.class.php /path/to/admin.class.php.disabled

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate BossCMS server
  • Deploy web application firewall (WAF) with custom rules to block exploit attempts

🔍 How to Verify

Check if Vulnerable:

Check BossCMS version in admin panel or by examining version files; if version is 1.3.0, system is vulnerable.

Check Version:

grep -r 'version.*1.3.0' /path/to/bosscms/installation/

Verify Fix Applied:

Verify BossCMS version has been updated from 1.3.0; check that admin.class.php permissions are properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to admin.class.php
  • Unusual privilege escalation events in system logs
  • Suspicious PHP execution patterns

Network Indicators:

  • Unusual outbound connections from BossCMS server
  • Traffic patterns indicating code execution

SIEM Query:

source="*bosscms*" AND (event="admin.class.php access" OR event="privilege escalation")

🔗 References

📤 Share & Export