Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39119: n/a

0
Medium
VulnerabilityCVE-2024-39119cvecve-2024-39119
Published: Tue Jul 02 2024 (07/02/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via admin/info_deal.php?mudi=rev&nohrefStr=close.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 04:15:10 UTC

Technical Analysis

CVE-2024-39119 identifies a Cross-Site Request Forgery (CSRF) vulnerability in idccms version 1.35, specifically targeting the admin/info_deal.php script with parameters mudi=rev and nohrefStr=close. CSRF vulnerabilities occur when an attacker tricks an authenticated user into submitting a forged HTTP request, causing the server to perform unintended actions on behalf of the user. In this case, the vulnerability allows attackers to potentially manipulate administrative functions without the administrator's explicit consent. The CVSS 3.1 base score of 5.4 reflects a medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The impact affects confidentiality and integrity (C:L/I:L) but not availability (A:N). The vulnerability is classified under CWE-352, which covers CSRF issues. No patches or known exploits are currently available, indicating that the vulnerability is newly disclosed and may not yet be actively exploited. However, the lack of authentication requirements for the attacker and the potential for unauthorized administrative actions make this a significant risk for affected deployments. Organizations running idccms 1.35 should prioritize mitigation and monitoring to prevent exploitation.

Potential Impact

The primary impact of CVE-2024-39119 is unauthorized modification of administrative settings or data within idccms 1.35 due to CSRF attacks. This can lead to confidentiality breaches if sensitive information is exposed or integrity violations if unauthorized changes are made to the CMS configuration or content. While availability is not directly impacted, the trustworthiness and security posture of the affected system can be severely compromised. For organizations relying on idccms for website or content management, this could result in defacement, data leakage, or unauthorized administrative control, potentially cascading into broader network compromises. The ease of exploitation, requiring only user interaction and no authentication, increases the risk, especially in environments where administrators access the CMS via web browsers without additional CSRF protections. The absence of known exploits in the wild provides a window for proactive defense, but the medium severity score suggests that timely mitigation is critical to prevent potential attacks.

Mitigation Recommendations

To mitigate CVE-2024-39119, organizations should implement several specific measures beyond generic advice: 1) Employ anti-CSRF tokens in all state-changing requests within idccms, especially on the admin/info_deal.php endpoint, to ensure that requests originate from legitimate sources. 2) Enforce SameSite cookie attributes (preferably 'Strict' or 'Lax') to reduce the risk of cross-origin requests carrying authentication cookies. 3) Implement user interaction confirmations for critical administrative actions to prevent automated or hidden request execution. 4) Restrict administrative interface access by IP whitelisting or VPN to limit exposure to trusted networks. 5) Monitor web server logs and application logs for unusual or repeated requests to the vulnerable endpoint that could indicate attempted exploitation. 6) If possible, isolate the CMS environment and apply web application firewall (WAF) rules to detect and block CSRF attack patterns targeting the affected parameters. 7) Stay alert for official patches or updates from the idccms vendor and apply them promptly once available. 8) Educate administrators about the risks of clicking unknown links while authenticated to the CMS to reduce the likelihood of successful social engineering.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c82b7ef31ef0b565bc0

Added to database: 2/25/2026, 9:41:22 PM

Last enriched: 2/28/2026, 4:15:10 AM

Last updated: 4/12/2026, 3:40:22 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses