CVE-2024-32641

9.8 CRITICAL

📋 TL;DR

CVE-2024-32641 is a critical remote code execution vulnerability in Masa CMS that allows unauthenticated attackers to execute arbitrary code on affected systems. The vulnerability exists in the addParam function where user-controlled input is improperly evaluated, enabling complete system compromise. All Masa CMS installations running vulnerable versions are affected.

💻 Affected Systems

Products:
  • Masa CMS
Versions: All versions prior to 7.2.8, 7.3.13, and 7.4.6
Operating Systems: All operating systems running Masa CMS
Default Config Vulnerable: ⚠️ Yes
Notes: All Masa CMS installations with vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with attacker gaining full control over the web server, allowing data theft, malware deployment, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Attackers deploy web shells, cryptocurrency miners, or ransomware, leading to data breach, service disruption, and potential compliance violations.

🟢

If Mitigated

If proper network segmentation and web application firewalls are in place, exploitation attempts may be blocked, limiting impact to the specific application instance.

🌐 Internet-Facing: HIGH - This vulnerability affects internet-facing content management systems and can be exploited without authentication.
🏢 Internal Only: MEDIUM - While still serious, internal-only systems have reduced attack surface compared to internet-facing deployments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in a core function and exploitation appears straightforward based on the advisory description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.2.8, 7.3.13, or 7.4.6

Vendor Advisory: https://github.com/MasaCMS/MasaCMS/security/advisories/GHSA-cj9g-v5mq-qrjm

Restart Required: Yes

Instructions:

1. Backup your Masa CMS installation and database. 2. Download the patched version (7.2.8, 7.3.13, or 7.4.6) from the official repository. 3. Replace the vulnerable files with patched versions. 4. Restart the web server. 5. Verify the patch is applied by checking the version.

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block requests containing suspicious m tag parameters or criteria parameter patterns

Network Access Control

all

Restrict access to Masa CMS administration interfaces to trusted IP addresses only

🧯 If You Can't Patch

  • Immediately take the vulnerable system offline until patching is possible
  • Implement strict network segmentation and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check your Masa CMS version against affected versions (prior to 7.2.8, 7.3.13, and 7.4.6)

Check Version:

Check the Masa CMS admin panel or examine the version files in the installation directory

Verify Fix Applied:

Verify the version is 7.2.8, 7.3.13, or 7.4.6 or higher, and test that the addParam function no longer accepts malicious input

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to Masa CMS endpoints with criteria parameter
  • Suspicious m tag usage in request parameters
  • Unexpected process execution from web server context

Network Indicators:

  • Outbound connections from web server to unknown IPs
  • Unusual traffic patterns to/from Masa CMS instances

SIEM Query:

source="web_server_logs" AND (uri="*masa*" OR uri="*cms*") AND (param="*criteria*" OR param="*m*" OR method="POST") AND status="200"

🔗 References

📤 Share & Export