CVE-2024-50966
📋 TL;DR
This CSRF vulnerability in dingfanzu CMS V1.0 allows attackers to trick authenticated administrators into performing unauthorized actions, specifically adding new admin accounts. Attackers can exploit this by luring administrators to malicious websites while logged into the CMS. This affects all installations of dingfanzu CMS V1.0 with the admin interface accessible.
💻 Affected Systems
- dingfanzu CMS
📦 What is this software?
Dingfanzu Cms by Timgreen
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the CMS installation through creation of attacker-controlled admin accounts, leading to data theft, defacement, or further system compromise.
Likely Case
Unauthorized admin account creation allowing attackers to gain administrative access to the CMS backend.
If Mitigated
Limited impact if proper CSRF protections are implemented or if admin sessions are properly managed.
🎯 Exploit Status
Exploitation requires social engineering to trick authenticated admins into visiting malicious pages.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Consider upgrading to a newer version if available, or implement CSRF protections manually.
🔧 Temporary Workarounds
Implement CSRF Tokens
allAdd CSRF token validation to /admin/doAdminAction.php
Manual code modification required
Restrict Admin Access
allLimit admin interface access to trusted IP addresses only
Manual configuration of web server or firewall rules
🧯 If You Can't Patch
- Implement SameSite cookie attributes for session cookies
- Require re-authentication for sensitive admin actions
🔍 How to Verify
Check if Vulnerable:
Check if /admin/doAdminAction.php?act=addAdmin endpoint accepts POST requests without CSRF token validation
Check Version:
Check CMS version in admin panel or configuration files
Verify Fix Applied:
Verify that CSRF tokens are required and validated for the affected endpoint
📡 Detection & Monitoring
Log Indicators:
- Multiple admin account creation attempts from same session
- Admin actions without referrer validation
Network Indicators:
- POST requests to /admin/doAdminAction.php without CSRF tokens
- Cross-origin requests to admin endpoints
SIEM Query:
web_access_logs WHERE uri CONTAINS '/admin/doAdminAction.php' AND method = 'POST' AND referrer NOT CONTAINS 'admin'