CVE-2024-35010

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in idccms v1.35 allows attackers to trick authenticated administrators into performing unauthorized actions, specifically deleting banner advertisements via the /admin/banner_deal.php endpoint. Attackers can craft malicious requests that execute when an admin visits a compromised page while logged in. This affects all idccms v1.35 installations with admin panel access.

💻 Affected Systems

Products:
  • idccms
Versions: v1.35
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin panel access; vulnerability exists in default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of website content management through unauthorized deletion of banners, potentially leading to defacement, loss of advertising revenue, or disruption of site functionality.

🟠

Likely Case

Unauthorized deletion of banner advertisements, causing temporary disruption to site advertising and requiring manual restoration of deleted content.

🟢

If Mitigated

No impact if proper CSRF protections are implemented or if administrators use separate browser sessions for admin tasks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick authenticated admin into clicking malicious link.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Consider upgrading to newer version if available or implementing CSRF protections manually.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF token validation to banner_deal.php and all admin endpoints

Manual code modification required - add token generation and validation

Restrict Admin Access

all

Limit admin panel access to specific IP addresses or VPN

Add IP restrictions to .htaccess or web server config

🧯 If You Can't Patch

  • Implement SameSite cookie attributes and require re-authentication for sensitive actions
  • Use separate browser sessions for admin tasks and regular browsing

🔍 How to Verify

Check if Vulnerable:

Check if /admin/banner_deal.php endpoint lacks CSRF token validation and accepts GET requests for delete operations

Check Version:

Check CMS version in admin panel or configuration files

Verify Fix Applied:

Verify that banner_deal.php now requires CSRF tokens and rejects unauthorized requests

📡 Detection & Monitoring

Log Indicators:

  • Multiple banner deletion requests from same admin session in short timeframe
  • Referer headers pointing to external domains in admin requests

Network Indicators:

  • HTTP GET requests to /admin/banner_deal.php?mudi=del with external referers

SIEM Query:

source="web_server" AND uri="/admin/banner_deal.php" AND query="mudi=del" AND referer NOT CONTAINS "yourdomain.com"

🔗 References

📤 Share & Export