CVE-2024-57160

4.3 MEDIUM

📋 TL;DR

CVE-2024-57160 is a Cross-Site Request Forgery vulnerability in 07FLYCMS that allows attackers to trick authenticated users into performing unauthorized actions by visiting a malicious webpage. This affects administrators and users with access to the OaTask edit functionality in vulnerable 07FLYCMS installations.

💻 Affected Systems

Products:
  • 07FLYCMS
Versions: V1.3.9
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with the OA module enabled and accessible via /oa/OaTask/edit.html endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could create, modify, or delete task records in the OA system, potentially disrupting business operations or manipulating sensitive workflow data.

🟠

Likely Case

Attackers could modify task assignments, statuses, or descriptions, causing confusion or minor operational disruption.

🟢

If Mitigated

With proper CSRF protections, no unauthorized actions can be performed even if users visit malicious pages.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the victim to be authenticated and visit a malicious webpage while logged into the 07FLYCMS system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Implement CSRF tokens in all state-changing endpoints, particularly /oa/OaTask/edit.html.

🔧 Temporary Workarounds

Implement CSRF Protection

all

Add CSRF tokens to the OaTask edit form and validate them on submission

Edit /oa/OaTask/edit.html to include CSRF token in form
Add server-side validation for CSRF token

Restrict Access

all

Limit access to the vulnerable endpoint using network controls or authentication

Configure firewall rules to restrict /oa/OaTask/edit.html access
Implement additional authentication requirements

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block CSRF attempts
  • Educate users about CSRF risks and safe browsing practices when accessing the OA system

🔍 How to Verify

Check if Vulnerable:

Check if /oa/OaTask/edit.html endpoint accepts POST requests without CSRF token validation by testing with a crafted request.

Check Version:

Check 07FLYCMS version in admin panel or configuration files

Verify Fix Applied:

Verify that all state-changing endpoints, particularly /oa/OaTask/edit.html, require and validate unique CSRF tokens.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed state-changing requests from same IP without proper referrer
  • Unusual task modifications from unexpected user accounts

Network Indicators:

  • HTTP POST requests to /oa/OaTask/edit.html without CSRF tokens
  • Requests with mismatched referrer headers

SIEM Query:

source="web_logs" AND uri="/oa/OaTask/edit.html" AND method="POST" AND NOT csrf_token=*

🔗 References

📤 Share & Export