CVE-2024-35554

5.4 MEDIUM

📋 TL;DR

CVE-2024-35554 is a Cross-Site Request Forgery vulnerability in idccms v1.35 that allows attackers to trick authenticated administrators into performing unauthorized actions via the /admin/infoWeb_deal.php endpoint. This affects all deployments of idccms v1.35 with administrative interfaces accessible to users.

💻 Affected Systems

Products:
  • idccms
Versions: v1.35
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with administrative interfaces accessible and where admins can be tricked into visiting malicious pages while authenticated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could delete website news content or perform other administrative actions without the admin's knowledge, potentially defacing or disrupting the website.

🟠

Likely Case

Attackers could delete news content or modify website settings through forged requests when an admin visits a malicious page while logged in.

🟢

If Mitigated

With proper CSRF protections, no unauthorized actions can be performed even if an admin visits malicious pages.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the victim admin to be authenticated and visit a malicious page. The GitHub reference shows proof-of-concept details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Implement CSRF tokens in /admin/infoWeb_deal.php and validate them on all state-changing requests.

🔧 Temporary Workarounds

Implement CSRF Protection

all

Add CSRF tokens to all forms and validate them on the server side for the affected endpoint.

Modify /admin/infoWeb_deal.php to include and validate CSRF tokens

Restrict Admin Access

all

Limit admin panel access to specific IP addresses or internal networks only.

Configure web server (Apache/Nginx) to restrict /admin/ paths to trusted IPs

🧯 If You Can't Patch

  • Implement strict SameSite cookie policies and require re-authentication for sensitive actions
  • Monitor admin activity logs for suspicious deletion or modification requests from unexpected sources

🔍 How to Verify

Check if Vulnerable:

Check if /admin/infoWeb_deal.php accepts POST requests without CSRF token validation when performing del operations on newsWeb data.

Check Version:

Check CMS version in admin panel or configuration files

Verify Fix Applied:

Test that all state-changing operations in /admin/infoWeb_deal.php require and validate CSRF tokens.

📡 Detection & Monitoring

Log Indicators:

  • Multiple DELETE/POST requests to /admin/infoWeb_deal.php with mudi=del parameters from unexpected sources
  • News content deletions without corresponding admin activity

Network Indicators:

  • HTTP requests to /admin/infoWeb_deal.php?mudi=del&dataType=newsWeb from non-admin IPs
  • Referer headers pointing to external domains in admin requests

SIEM Query:

source="web_logs" AND uri_path="/admin/infoWeb_deal.php" AND query_string="*mudi=del*" AND NOT src_ip IN (admin_ip_list)

🔗 References

📤 Share & Export