CVE-2024-32418

9.8 CRITICAL

📋 TL;DR

This vulnerability in flusity CMS v2.33 allows remote attackers to execute arbitrary code through the add_addon.php component, leading to complete system compromise. It affects all systems running the vulnerable version of flusity CMS. Attackers can gain full control over affected web servers.

💻 Affected Systems

Products:
  • flusity CMS
Versions: v2.33
Operating Systems: Linux, Windows, Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations. The add_addon.php component appears to be accessible without proper authentication or input validation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover with attacker gaining root/admin privileges, data exfiltration, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Web server compromise leading to website defacement, data theft, and use as a pivot point for internal network attacks.

🟢

If Mitigated

Limited impact with proper network segmentation, WAF rules blocking the exploit path, and restricted file upload permissions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

References indicate proof-of-concept exists. The high CVSS score and remote code execution nature make weaponization likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

1. Check flusity CMS vendor website for security updates
2. Upgrade to a patched version if available
3. If no patch exists, implement workarounds immediately

🔧 Temporary Workarounds

Disable add_addon.php

linux

Remove or restrict access to the vulnerable component

mv /path/to/flusity/add_addon.php /path/to/flusity/add_addon.php.disabled
chmod 000 /path/to/flusity/add_addon.php.disabled

Implement WAF Rules

all

Block requests to add_addon.php at web application firewall level

🧯 If You Can't Patch

  • Network segmentation to isolate flusity CMS from critical systems
  • Implement strict file upload restrictions and disable PHP execution in upload directories

🔍 How to Verify

Check if Vulnerable:

Check if flusity CMS version is 2.33 and if add_addon.php file exists and is accessible

Check Version:

Check flusity CMS configuration files or admin panel for version information

Verify Fix Applied:

Verify add_addon.php is no longer accessible or has been removed/disabled

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to add_addon.php with suspicious parameters
  • Unusual file uploads or PHP file creation in CMS directories
  • System commands executed from web process

Network Indicators:

  • Outbound connections from web server to unknown IPs
  • Unusual traffic patterns from CMS server

SIEM Query:

source="web_logs" AND (uri="/add_addon.php" OR uri LIKE "%add_addon%")

🔗 References

📤 Share & Export