CVE-2024-26352
📋 TL;DR
Flusity-CMS v2.33 contains a CSRF vulnerability in the /core/tools/add_places.php component that allows attackers to trick authenticated administrators into performing unauthorized actions. This affects all Flusity-CMS v2.33 installations with administrative interfaces accessible to users. Attackers can exploit this to modify system settings or add malicious content.
💻 Affected Systems
- Flusity-CMS
📦 What is this software?
Flusity by Flusity
⚠️ Risk & Real-World Impact
Worst Case
Attackers could gain administrative control, modify system configurations, inject malicious content, or compromise the entire CMS installation and underlying server.
Likely Case
Attackers trick administrators into adding unauthorized content or modifying system settings, potentially leading to data manipulation, defacement, or further exploitation.
If Mitigated
With proper CSRF protections and administrative controls, impact is limited to unsuccessful exploitation attempts that are logged and blocked.
🎯 Exploit Status
Exploitation requires tricking an authenticated administrator to visit a malicious page while logged in.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None known
Restart Required: No
Instructions:
1. Check for updated version from Flusity-CMS developers. 2. If no patch available, implement CSRF tokens in /core/tools/add_places.php. 3. Validate and sanitize all POST requests to this endpoint.
🔧 Temporary Workarounds
Implement CSRF Protection
allAdd CSRF tokens to the add_places.php form and validate them on submission
Edit /core/tools/add_places.php to include CSRF token generation and validation
Restrict Administrative Access
allLimit access to administrative interfaces to trusted IP addresses only
Add IP-based restrictions in .htaccess or web server configuration for /core/tools/ directory
🧯 If You Can't Patch
- Implement strict SameSite cookie attributes and require re-authentication for sensitive actions
- Deploy a WAF with CSRF protection rules and monitor for exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Review /core/tools/add_places.php for absence of CSRF token validation in POST requests
Check Version:
Check CMS version in admin panel or configuration files
Verify Fix Applied:
Test that POST requests to /core/tools/add_places.php require valid CSRF tokens
📡 Detection & Monitoring
Log Indicators:
- Multiple failed POST requests to /core/tools/add_places.php
- Unusual administrative actions from unexpected sources
Network Indicators:
- HTTP POST requests to /core/tools/add_places.php without referrer validation
- Cross-origin requests to administrative endpoints
SIEM Query:
source="web_logs" AND uri="/core/tools/add_places.php" AND method="POST" AND (NOT referrer CONTAINS "expected_domain")