CVE-2024-48191

6.3 MEDIUM

📋 TL;DR

This CSRF vulnerability in dingfanzu CMS 1.0 allows attackers to trick authenticated administrators into performing unauthorized actions, specifically deleting admin accounts. Attackers can craft malicious requests that execute when an admin visits a compromised page while logged in. This affects all installations of dingfanzu CMS 1.0 with admin panels exposed.

💻 Affected Systems

Products:
  • dingfanzu CMS
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with the admin panel accessible and admin sessions active.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the CMS administration by deleting all admin accounts, leading to loss of administrative control and potential site takeover.

🟠

Likely Case

Targeted deletion of specific admin accounts, causing administrative disruption and potential privilege escalation for attackers.

🟢

If Mitigated

Minimal impact if proper CSRF protections are implemented and admin sessions are properly managed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the victim to be logged in as admin and visit a malicious page. The specific endpoint /admin/doAdminAction.php?act=delAdmin&id=17 is vulnerable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Implement CSRF tokens in all admin actions, particularly in doAdminAction.php. Validate referer headers and implement same-origin policy checks.

🔧 Temporary Workarounds

Implement CSRF Protection

all

Add CSRF tokens to all admin forms and validate them on submission

Modify /admin/doAdminAction.php to include and validate CSRF tokens

Restrict Admin Access

all

Limit admin panel access to specific IP addresses or internal networks

Add IP restrictions in .htaccess or web server configuration for /admin/ directory

🧯 If You Can't Patch

  • Implement strict access controls to admin panel (IP whitelisting, VPN requirement)
  • Use browser extensions that block CSRF attempts and educate admins about phishing risks

🔍 How to Verify

Check if Vulnerable:

Test if /admin/doAdminAction.php?act=delAdmin&id=17 accepts requests without CSRF tokens when admin is logged in

Check Version:

Check CMS version in configuration files or admin panel

Verify Fix Applied:

Verify that all admin actions require valid CSRF tokens and proper referer validation

📡 Detection & Monitoring

Log Indicators:

  • Multiple DELETE or admin modification requests from same session without corresponding form submissions
  • Requests to /admin/doAdminAction.php with act=delAdmin parameter

Network Indicators:

  • HTTP POST/GET requests to admin endpoints without proper referer headers
  • Suspicious redirects to admin actions from external domains

SIEM Query:

source="web_logs" AND uri="/admin/doAdminAction.php" AND (query="*act=delAdmin*" OR method="POST") | stats count by src_ip, user_agent

🔗 References

📤 Share & Export