CVE-2024-34958

6.5 MEDIUM

📋 TL;DR

This CSRF vulnerability in idccms v1.35 allows attackers to trick authenticated administrators into performing unauthorized actions via the banner management interface. Attackers can add malicious banners or modify system settings without the admin's knowledge. Only administrators with access to the affected admin panel are vulnerable.

💻 Affected Systems

Products:
  • idccms
Versions: v1.35
Operating Systems: all
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator authentication and access to the vulnerable admin panel component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the CMS through unauthorized administrative actions, potentially leading to website defacement, malware injection, or data theft.

🟠

Likely Case

Unauthorized banner additions or modifications, potentially redirecting users to malicious sites or displaying harmful content.

🟢

If Mitigated

No impact if proper CSRF protections are implemented and administrators follow security best practices.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks are well-understood and easy to implement; exploitation requires tricking an authenticated administrator.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: unknown

Vendor Advisory: none

Restart Required: No

Instructions:

No official patch available. Implement CSRF tokens in admin/banner_deal.php and validate all POST requests.

🔧 Temporary Workarounds

Implement CSRF Protection

all

Add CSRF tokens to the banner management form and validate them on submission.

Modify admin/banner_deal.php to include CSRF token generation and validation

Restrict Admin Panel Access

all

Limit access to the admin panel using IP whitelisting or VPN requirements.

Configure web server (Apache/Nginx) to restrict access to /admin/ directory

🧯 If You Can't Patch

  • Require re-authentication for sensitive administrative actions
  • Implement SameSite cookie attributes and CORS restrictions

🔍 How to Verify

Check if Vulnerable:

Check if admin/banner_deal.php lacks CSRF token validation and allows POST requests without proper origin checking.

Check Version:

Check CMS version in admin panel or configuration files

Verify Fix Applied:

Test that banner addition requests fail without valid CSRF tokens and proper referrer validation.

📡 Detection & Monitoring

Log Indicators:

  • Multiple banner addition requests from unusual IPs
  • Admin actions without corresponding login events

Network Indicators:

  • POST requests to admin/banner_deal.php without CSRF tokens
  • Requests with mismatched referrer headers

SIEM Query:

source="web_logs" AND uri="/admin/banner_deal.php" AND method="POST" AND NOT csrf_token=*

🔗 References

📤 Share & Export