CVE-2024-50858
📋 TL;DR
GestioIP v3.5.7 contains CSRF vulnerabilities in multiple endpoints that allow attackers to trick authenticated administrators into performing unauthorized actions. This can lead to data modification, deletion, or exfiltration when administrators visit malicious websites while logged into GestioIP. All organizations using the vulnerable version are affected.
💻 Affected Systems
- GestioIP
📦 What is this software?
Gestioip by Gestioip
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of GestioIP data including network configuration deletion, IP address management tampering, and potential credential theft leading to broader network compromise.
Likely Case
Unauthorized modification or deletion of IP address assignments, network configurations, and administrative settings within GestioIP.
If Mitigated
Limited impact with proper CSRF protections and administrative awareness, though some risk remains from sophisticated attacks.
🎯 Exploit Status
Exploitation requires the victim to be authenticated as an administrator and visit a malicious website. No authentication bypass is needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v3.5.8 or later
Vendor Advisory: http://www.gestioip.net
Restart Required: No
Instructions:
1. Backup current GestioIP installation and database. 2. Download latest version from official website. 3. Replace vulnerable files with patched version. 4. Verify CSRF tokens are implemented on all endpoints.
🔧 Temporary Workarounds
Implement CSRF Protection Headers
allAdd CSRF tokens or SameSite cookie attributes to protect against cross-site request forgery
Set-Cookie: session=value; SameSite=Strict; Secure; HttpOnly
Admin Session Timeout Reduction
allReduce administrative session timeout to minimize exposure window
Modify session configuration to reduce timeout (e.g., session.gc_maxlifetime in PHP)
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to detect and block CSRF attempts
- Require administrators to use separate browser profiles or incognito mode for GestioIP access only
🔍 How to Verify
Check if Vulnerable:
Check if GestioIP version is 3.5.7 or earlier. Review application endpoints for missing CSRF tokens.
Check Version:
Check GestioIP web interface footer or configuration files for version information
Verify Fix Applied:
Verify version is 3.5.8 or later. Test endpoints to confirm CSRF tokens are present and validated.
📡 Detection & Monitoring
Log Indicators:
- Multiple administrative actions from same session in rapid succession
- Requests missing CSRF tokens or referer headers
Network Indicators:
- External domains making POST requests to GestioIP endpoints
- Unusual administrative activity patterns
SIEM Query:
source="gestioip" AND (action="modify" OR action="delete") AND NOT referer="*gestioip*"