CVE-2024-51484

8.1 HIGH

📋 TL;DR

Ampache versions before 7.0.1 have a CSRF vulnerability in token parsing when activating/deactivating controllers, allowing attackers to trick authenticated administrators into performing unauthorized actions via malicious requests. This affects all Ampache installations with vulnerable versions that have administrative interfaces accessible to users. The vulnerability enables attackers to modify website features that should be restricted to administrators.

💻 Affected Systems

Products:
  • Ampache
Versions: All versions before 7.0.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All Ampache installations with vulnerable versions are affected regardless of configuration. The vulnerability requires an authenticated administrator session to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could completely compromise the Ampache instance by tricking administrators into executing malicious controller actions, potentially enabling full system takeover, data manipulation, or service disruption.

🟠

Likely Case

Attackers would trick authenticated administrators into performing unauthorized controller actions, potentially changing application settings, disabling security features, or manipulating content.

🟢

If Mitigated

With proper network segmentation and access controls limiting administrative interfaces to trusted networks only, the attack surface is significantly reduced.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated administrator into clicking a malicious link or visiting a compromised page while logged into Ampache.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.0.1

Vendor Advisory: https://github.com/ampache/ampache/security/advisories/GHSA-h6vj-6rvc-3x29

Restart Required: Yes

Instructions:

1. Backup your current Ampache installation and database. 2. Download Ampache 7.0.1 or later from the official repository. 3. Replace the existing installation with the new version. 4. Restart your web server service. 5. Verify the upgrade was successful.

🔧 Temporary Workarounds

No official workarounds available

all

The vendor advisory states there are no known workarounds for this vulnerability

🧯 If You Can't Patch

  • Restrict administrative access to Ampache to trusted internal networks only using firewall rules or network segmentation
  • Implement additional CSRF protection at the web application firewall level or use browser extensions that block CSRF attempts

🔍 How to Verify

Check if Vulnerable:

Check your Ampache version by viewing the web interface footer or examining the source code version files. If version is below 7.0.1, you are vulnerable.

Check Version:

grep -r "version.*7\." /path/to/ampache/install/ or check web interface footer

Verify Fix Applied:

After upgrading, verify the version shows 7.0.1 or higher in the web interface footer or version files.

📡 Detection & Monitoring

Log Indicators:

  • Unusual controller activation/deactivation requests
  • Multiple failed CSRF token validations from same IP
  • Administrative actions from unexpected user agents or IPs

Network Indicators:

  • HTTP POST requests to controller endpoints without proper referrer headers
  • Requests with manipulated or missing CSRF tokens

SIEM Query:

web_server_logs | where url contains "/controller/" and (action contains "activate" or action contains "deactivate") and csrf_token validation = failed

🔗 References

📤 Share & Export