CVE-2024-24468

8.8 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in flusity-CMS v2.33 allows remote attackers to execute arbitrary code via the add_customblock.php endpoint. This affects all users running the vulnerable version of flusity-CMS, potentially enabling attackers to take full control of affected systems.

💻 Affected Systems

Products:
  • flusity-CMS
Versions: v2.33
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation of flusity-CMS v2.33.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution, allowing attackers to install malware, steal data, or pivot to other systems.

🟠

Likely Case

Unauthorized code execution leading to website defacement, data theft, or backdoor installation.

🟢

If Mitigated

Limited impact with proper CSRF protections and input validation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the victim to be authenticated and visit a malicious page while logged into flusity-CMS.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check the flusity-CMS GitHub repository or official website for security updates. If no patch is available, implement workarounds immediately.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF protection tokens to all state-changing forms and endpoints.

Modify add_customblock.php to include CSRF token validation

Restrict Access to add_customblock.php

all

Limit access to the vulnerable endpoint using authentication or IP restrictions.

Add .htaccess rules or web server configuration to restrict access

🧯 If You Can't Patch

  • Disable or remove the add_customblock.php file if not needed.
  • Implement web application firewall (WAF) rules to block CSRF attacks targeting this endpoint.

🔍 How to Verify

Check if Vulnerable:

Check if running flusity-CMS version 2.33 and if add_customblock.php exists without CSRF protection.

Check Version:

Check CMS configuration files or admin panel for version information.

Verify Fix Applied:

Verify that CSRF tokens are properly implemented and validated in add_customblock.php.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to add_customblock.php from unexpected referrers
  • Multiple failed CSRF token validations

Network Indicators:

  • HTTP requests to add_customblock.php with suspicious payloads
  • Requests originating from known malicious domains

SIEM Query:

source="web_logs" AND uri="/add_customblock.php" AND (referrer NOT IN allowed_domains OR csrf_token="")

🔗 References

📤 Share & Export