CVE-2024-33829

5.4 MEDIUM

📋 TL;DR

CVE-2024-33829 is a Cross-Site Request Forgery vulnerability in idccms v1.35 that allows attackers to trick authenticated administrators into performing unauthorized actions via the /admin/readDeal.php?mudi=updateWebCache endpoint. This affects all idccms v1.35 installations with administrative interfaces accessible to users.

💻 Affected Systems

Products:
  • idccms
Versions: v1.35
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with administrative interfaces accessible to users who could be tricked into visiting malicious pages while authenticated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could trick an authenticated administrator into executing arbitrary administrative actions, potentially leading to website defacement, data manipulation, or configuration changes that enable further attacks.

🟠

Likely Case

Attackers could modify website cache settings or other administrative configurations, causing service disruption or enabling secondary attacks.

🟢

If Mitigated

With proper CSRF protections and administrative access controls, the impact is limited to failed exploitation attempts with no actual compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick authenticated administrators into clicking malicious links.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing CSRF protections manually.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF token validation to the /admin/readDeal.php endpoint

Modify PHP code to generate and validate unique tokens per session

Restrict Administrative Access

all

Limit administrative interface access to trusted networks only

Configure firewall rules or web server access controls

🧯 If You Can't Patch

  • Implement network segmentation to isolate administrative interfaces from general user access
  • Use browser extensions that block CSRF attempts and educate administrators about phishing risks

🔍 How to Verify

Check if Vulnerable:

Check if idccms version is 1.35 and examine /admin/readDeal.php for CSRF token validation

Check Version:

Check CMS configuration files or admin panel for version information

Verify Fix Applied:

Test that administrative actions require valid CSRF tokens and fail without them

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed administrative actions from same IP
  • Administrative actions without referrer headers

Network Indicators:

  • HTTP POST requests to /admin/readDeal.php without CSRF tokens from unexpected sources

SIEM Query:

source_ip OUTSIDE trusted_networks AND uri_path='/admin/readDeal.php' AND http_method='POST'

🔗 References

📤 Share & Export