CVE-2024-38293

9.6 CRITICAL

📋 TL;DR

ALCASAR versions before 3.6.1 contain a Cross-Site Request Forgery (CSRF) vulnerability in activity.php that allows remote code execution. Attackers can trick authenticated users into executing malicious actions, potentially compromising the entire ALCASAR system. This affects all organizations using vulnerable ALCASAR installations for network access control.

💻 Affected Systems

Products:
  • ALCASAR
Versions: All versions before 3.6.1
Operating Systems: Linux-based systems where ALCASAR is deployed
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The vulnerability is in the web interface component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary code, steal credentials, pivot to internal networks, and maintain persistent access.

🟠

Likely Case

Attackers gain administrative access to ALCASAR, modify network access policies, intercept user traffic, and potentially compromise connected systems.

🟢

If Mitigated

Limited impact with proper CSRF protections and network segmentation, though some service disruption may occur.

🌐 Internet-Facing: HIGH - ALCASAR is typically deployed as an internet-facing captive portal for network access control.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they can trick authenticated administrators.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated user, but the CSRF to RCE chain makes this relatively straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.6.1

Vendor Advisory: https://adullact.net/frs/download.php/file/8930/CHANGELOG.md

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download ALCASAR 3.6.1 from alcasar.net/download. 3. Follow upgrade instructions in documentation. 4. Restart ALCASAR services. 5. Verify functionality.

🔧 Temporary Workarounds

CSRF Token Implementation

linux

Add CSRF tokens to all forms in activity.php and verify them on submission

Requires code modification to activity.php - consult ALCASAR documentation for implementation details

Network Segmentation

linux

Restrict access to ALCASAR administration interface to trusted networks only

iptables -A INPUT -p tcp --dport [ALCASAR_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [ALCASAR_PORT] -j DROP

🧯 If You Can't Patch

  • Implement strict SameSite cookie policies and Content Security Policy headers
  • Deploy WAF with CSRF protection rules and monitor for suspicious activity.php requests

🔍 How to Verify

Check if Vulnerable:

Check ALCASAR version via web interface or command line. Versions below 3.6.1 are vulnerable.

Check Version:

cat /etc/alcasar/version or check web interface administration panel

Verify Fix Applied:

Verify version is 3.6.1 or higher and test CSRF protection on activity.php forms

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to activity.php
  • Multiple failed CSRF token validations
  • Unexpected process execution from web server user

Network Indicators:

  • Suspicious traffic patterns to ALCASAR web interface
  • Unexpected outbound connections from ALCASAR server

SIEM Query:

source="alcasar.logs" AND (url="*activity.php*" AND method="POST") AND NOT (referer="*alcasar*")

🔗 References

📤 Share & Export