CVE-2024-26352

8.8 HIGH

📋 TL;DR

Flusity-CMS v2.33 contains a CSRF vulnerability in the /core/tools/add_places.php component that allows attackers to trick authenticated administrators into performing unauthorized actions. This affects all Flusity-CMS v2.33 installations with administrative interfaces accessible to users. Attackers can exploit this to modify system settings or add malicious content.

💻 Affected Systems

Products:
  • Flusity-CMS
Versions: v2.33
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with administrative access enabled and the vulnerable component accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could gain administrative control, modify system configurations, inject malicious content, or compromise the entire CMS installation and underlying server.

🟠

Likely Case

Attackers trick administrators into adding unauthorized content or modifying system settings, potentially leading to data manipulation, defacement, or further exploitation.

🟢

If Mitigated

With proper CSRF protections and administrative controls, impact is limited to unsuccessful exploitation attempts that are logged and blocked.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated administrator to visit a malicious page while logged in.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

1. Check for updated version from Flusity-CMS developers. 2. If no patch available, implement CSRF tokens in /core/tools/add_places.php. 3. Validate and sanitize all POST requests to this endpoint.

🔧 Temporary Workarounds

Implement CSRF Protection

all

Add CSRF tokens to the add_places.php form and validate them on submission

Edit /core/tools/add_places.php to include CSRF token generation and validation

Restrict Administrative Access

all

Limit access to administrative interfaces to trusted IP addresses only

Add IP-based restrictions in .htaccess or web server configuration for /core/tools/ directory

🧯 If You Can't Patch

  • Implement strict SameSite cookie attributes and require re-authentication for sensitive actions
  • Deploy a WAF with CSRF protection rules and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Review /core/tools/add_places.php for absence of CSRF token validation in POST requests

Check Version:

Check CMS version in admin panel or configuration files

Verify Fix Applied:

Test that POST requests to /core/tools/add_places.php require valid CSRF tokens

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed POST requests to /core/tools/add_places.php
  • Unusual administrative actions from unexpected sources

Network Indicators:

  • HTTP POST requests to /core/tools/add_places.php without referrer validation
  • Cross-origin requests to administrative endpoints

SIEM Query:

source="web_logs" AND uri="/core/tools/add_places.php" AND method="POST" AND (NOT referrer CONTAINS "expected_domain")

🔗 References

📤 Share & Export