CVE-2024-32642

8.8 HIGH

📋 TL;DR

Masa CMS versions before 7.2.8, 7.3.13, and 7.4.6 are vulnerable to host header poisoning, which allows attackers to hijack password reset emails and take over user accounts. This affects all Masa CMS installations using vulnerable versions. Attackers can compromise any user account, including administrators.

💻 Affected Systems

Products:
  • Masa CMS
Versions: All versions before 7.2.8, 7.3.13, and 7.4.6
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All Masa CMS installations with password reset functionality enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via administrator account takeover, leading to data theft, website defacement, or ransomware deployment.

🟠

Likely Case

Attacker takes over user accounts to steal sensitive data, send phishing emails from legitimate accounts, or escalate privileges.

🟢

If Mitigated

Limited impact if strong network controls prevent external access or if multi-factor authentication is enforced for sensitive accounts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires manipulating HTTP Host headers to redirect password reset emails to attacker-controlled domains.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.2.8, 7.3.13, or 7.4.6

Vendor Advisory: https://github.com/MasaCMS/MasaCMS/security/advisories/GHSA-qjm6-c8hx-ffh8

Restart Required: Yes

Instructions:

1. Backup your Masa CMS installation and database. 2. Download the patched version (7.2.8, 7.3.13, or 7.4.6) from the official repository. 3. Replace the existing files with the patched version. 4. Restart the web server and application services. 5. Verify the fix by checking the version and testing password reset functionality.

🔧 Temporary Workarounds

Configure web server to validate Host headers

all

Set strict Host header validation in your web server configuration to reject malicious Host headers.

# For Apache: Set UseCanonicalName On in httpd.conf
# For Nginx: Set server_name with valid domains in nginx.conf

Disable password reset functionality

all

Temporarily disable password reset emails if not critical, forcing manual account recovery.

# Modify Masa CMS configuration to disable email-based password reset

🧯 If You Can't Patch

  • Implement network-level controls to block external access to the Masa CMS instance.
  • Enforce multi-factor authentication for all user accounts, especially administrators.

🔍 How to Verify

Check if Vulnerable:

Check your Masa CMS version against affected versions. If using a version before 7.2.8, 7.3.13, or 7.4.6, you are vulnerable.

Check Version:

Check the Masa CMS admin panel or review the version file in the installation directory.

Verify Fix Applied:

After patching, verify the version is 7.2.8, 7.3.13, or 7.4.6 and test password reset functionality with manipulated Host headers to ensure it fails.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Host header values in HTTP logs
  • Multiple failed password reset attempts from single IP
  • Password reset emails sent to unexpected domains

Network Indicators:

  • HTTP requests with manipulated Host headers
  • Outbound connections to suspicious domains after password reset requests

SIEM Query:

source="web_logs" AND (Host:*malicious-domain* OR Host:*attacker*)

🔗 References

📤 Share & Export