CVE-2024-35550
📋 TL;DR
This CSRF vulnerability in idccms v1.35 allows attackers to trick authenticated administrators into performing unauthorized actions via the /admin/infoWeb_deal.php endpoint. Attackers can modify website settings or potentially escalate privileges. Only administrators with access to the admin panel are affected.
💻 Affected Systems
- idccms
📦 What is this software?
Idccms by Idccms
⚠️ Risk & Real-World Impact
Worst Case
Complete website takeover through privilege escalation or configuration changes that enable further attacks.
Likely Case
Unauthorized modification of website settings, content, or user permissions by tricking an admin.
If Mitigated
No impact if CSRF tokens are properly implemented and SameSite cookies are enforced.
🎯 Exploit Status
Exploitation requires an authenticated admin session and the admin to visit a malicious page. Public proof-of-concept exists in GitHub references.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None known
Restart Required: No
Instructions:
No official patch available. Implement CSRF tokens in /admin/infoWeb_deal.php and validate them on the server side.
🔧 Temporary Workarounds
Implement CSRF Protection
allAdd unique CSRF tokens to forms and validate them server-side before processing requests.
Edit /admin/infoWeb_deal.php to generate and validate CSRF tokens
Restrict Admin Access
allLimit admin panel access to specific IP addresses or VPN-only networks.
Add IP restrictions in .htaccess or web server config: Require ip 192.168.1.0/24
🧯 If You Can't Patch
- Implement strict SameSite cookie policies for session cookies
- Require re-authentication for sensitive admin actions
🔍 How to Verify
Check if Vulnerable:
Check if /admin/infoWeb_deal.php processes POST requests without CSRF token validation.
Check Version:
Check CMS version in admin panel or readme files
Verify Fix Applied:
Test that forms include CSRF tokens and server rejects requests without valid tokens.
📡 Detection & Monitoring
Log Indicators:
- Multiple POST requests to /admin/infoWeb_deal.php from different referrers
- Admin actions without corresponding form submissions
Network Indicators:
- HTTP requests to admin endpoints with external referrers
- Suspicious redirects to admin URLs
SIEM Query:
source="web_logs" AND uri="/admin/infoWeb_deal.php" AND referrer NOT CONTAINS "yourdomain.com"