CVE-2024-35556

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in idccms v1.35 allows attackers to trick authenticated administrators into performing unauthorized actions via crafted requests to the /admin/vpsSys_deal.php endpoint. Attackers could modify system settings, add/delete users, or change configurations without the admin's knowledge. Only administrators with access to the admin panel are affected.

💻 Affected Systems

Products:
  • idccms
Versions: v1.35
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin authentication but no CSRF tokens are implemented in the vulnerable endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the CMS installation including administrative account takeover, data manipulation, backdoor installation, and potential server compromise if CMS has elevated privileges.

🟠

Likely Case

Unauthorized configuration changes, user account manipulation, or content modification leading to defacement, data loss, or privilege escalation.

🟢

If Mitigated

Limited impact with proper CSRF protections, though some risk remains if other vulnerabilities are chained.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated admin to visit a malicious page. The GitHub reference shows proof-of-concept.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: No

Instructions:

No official patch available. Implement CSRF protection manually by adding anti-CSRF tokens to /admin/vpsSys_deal.php and validating them on the server side.

🔧 Temporary Workarounds

Implement CSRF Protection

all

Add CSRF tokens to admin forms and validate them server-side

Edit /admin/vpsSys_deal.php to include and validate CSRF tokens

Restrict Admin Access

all

Limit admin panel access to specific IP addresses or VPN

Add IP restrictions to .htaccess or web server config for /admin/ directory

🧯 If You Can't Patch

  • Implement SameSite cookies and CORS restrictions
  • Use browser extensions that block CSRF attempts for admin users

🔍 How to Verify

Check if Vulnerable:

Check if /admin/vpsSys_deal.php?mudi=infoSet endpoint accepts POST requests without CSRF token validation

Check Version:

Check CMS version in admin panel or readme files

Verify Fix Applied:

Test that the endpoint now requires and validates CSRF tokens

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /admin/vpsSys_deal.php from different referrers
  • Unauthorized configuration changes in admin logs

Network Indicators:

  • Requests to admin endpoints with suspicious referrer headers
  • CSRF payloads in network traffic

SIEM Query:

source="web_logs" AND uri="/admin/vpsSys_deal.php" AND method="POST" AND referrer NOT CONTAINS "yourdomain.com"

🔗 References

📤 Share & Export