CVE-2024-35552

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in idccms v1.35 allows attackers to trick authenticated administrators into performing unauthorized actions via crafted requests. Attackers could delete logos or potentially perform other administrative functions without the admin's knowledge. Only systems running the vulnerable version with administrative interfaces exposed are affected.

💻 Affected Systems

Products:
  • idccms
Versions: v1.35
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrative access to the CMS interface for exploitation. The vulnerability exists in the administrative backend.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of CMS administrative functions, allowing attackers to delete content, modify configurations, or potentially escalate to full system control if combined with other vulnerabilities.

🟠

Likely Case

Unauthorized deletion of logos or other content managed through the vulnerable endpoint, causing website defacement or disruption.

🟢

If Mitigated

No impact if proper CSRF protections are implemented or if administrative interfaces are not accessible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks are well-understood and easy to implement. The provided GitHub references contain demonstration of the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Implement CSRF tokens in /admin/infoMove_deal.php and validate them on all POST requests. Update to a newer version if available from the vendor.

🔧 Temporary Workarounds

Implement CSRF Protection

all

Add CSRF tokens to forms and validate them server-side

Edit /admin/infoMove_deal.php to include CSRF token validation

Restrict Admin Access

all

Limit access to administrative interface to trusted IPs only

Add IP restrictions to .htaccess or web server configuration for /admin/ directory

🧯 If You Can't Patch

  • Implement strict SameSite cookie policies and require re-authentication for sensitive actions
  • Monitor admin interface access logs for suspicious activity and implement web application firewall rules

🔍 How to Verify

Check if Vulnerable:

Check if /admin/infoMove_deal.php accepts POST requests without CSRF token validation. Test by creating a simple HTML form that submits to this endpoint.

Check Version:

Check CMS version in admin panel or look for version information in source files

Verify Fix Applied:

Verify that POST requests to /admin/infoMove_deal.php now require and validate CSRF tokens.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /admin/infoMove_deal.php from different IPs in short time
  • Admin actions without corresponding admin login events

Network Indicators:

  • Cross-origin requests to admin endpoints
  • Suspicious referrer headers in admin requests

SIEM Query:

source="web_logs" AND uri="/admin/infoMove_deal.php" AND method="POST" AND NOT referer CONTAINS "admin"

🔗 References

📤 Share & Export