CVE-2024-39153

4.7 MEDIUM

📋 TL;DR

CVE-2024-39153 is a Cross-Site Request Forgery vulnerability in idccms v1.35 that allows attackers to trick authenticated administrators into performing unauthorized actions via the /admin/info_deal.php endpoint. This affects all deployments of idccms v1.35 with administrative interfaces accessible to users.

💻 Affected Systems

Products:
  • idccms
Versions: v1.35
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrative access to the CMS interface for exploitation. The vulnerability exists in the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could delete news content or potentially perform other administrative actions by tricking an authenticated admin into clicking a malicious link, leading to data loss or content manipulation.

🟠

Likely Case

Attackers create phishing campaigns targeting administrators to delete news content or perform limited administrative actions through forged requests.

🟢

If Mitigated

With proper CSRF protections and admin awareness, the risk is reduced to minimal as legitimate requests require admin interaction with malicious content.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the victim to be authenticated as an administrator and to interact with malicious content. Public proof-of-concept demonstrates the CSRF attack vector.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available, implementing CSRF tokens, or applying workarounds.

🔧 Temporary Workarounds

Implement CSRF Token Protection

all

Add CSRF tokens to all administrative forms and validate them on the server side.

Modify /admin/info_deal.php to include and validate CSRF tokens in requests

Restrict Admin Interface Access

all

Limit access to the administrative interface to trusted IP addresses only.

Add IP-based restrictions in .htaccess or web server configuration for /admin/ directory

🧯 If You Can't Patch

  • Implement strict SameSite cookie policies and require re-authentication for sensitive actions
  • Educate administrators about phishing risks and implement security awareness training

🔍 How to Verify

Check if Vulnerable:

Check if the /admin/info_deal.php endpoint accepts POST requests without CSRF token validation when mudi=del parameters are used.

Check Version:

Check CMS version in admin panel or look for version indicators in source code

Verify Fix Applied:

Verify that all administrative forms include and validate unique CSRF tokens for each session.

📡 Detection & Monitoring

Log Indicators:

  • Multiple DELETE requests to /admin/info_deal.php from same session without corresponding form submissions
  • Admin actions occurring without typical user interaction patterns

Network Indicators:

  • HTTP requests to /admin/info_deal.php with mudi=del parameters originating from unexpected referrers

SIEM Query:

source="web_logs" AND uri="/admin/info_deal.php" AND query="mudi=del" | stats count by src_ip, user_agent

🔗 References

📤 Share & Export