Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39155: n/a

0
Medium
VulnerabilityCVE-2024-39155cvecve-2024-39155
Published: Thu Jun 27 2024 (06/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-39155 is a Cross-Site Request Forgery (CSRF) vulnerability found in idccms version 1. 35, specifically in the /admin/ipRecord_deal. php? mudi=add component. This vulnerability allows an attacker with some level of privileges (PR:L) to trick an authenticated user into submitting unauthorized requests, potentially leading to high confidentiality impact and limited integrity and availability impact. Exploitation requires user interaction and low attack complexity, but no privilege escalation beyond existing privileges. There are no known exploits in the wild currently, and no patches have been published yet. The CVSS score is 6. 8, indicating a medium severity level. Organizations using idccms 1.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:48:41 UTC

Technical Analysis

CVE-2024-39155 identifies a Cross-Site Request Forgery (CSRF) vulnerability in idccms version 1.35, affecting the administrative endpoint /admin/ipRecord_deal.php?mudi=add. CSRF vulnerabilities occur when a web application does not properly verify that requests made to sensitive endpoints originate from legitimate users, allowing attackers to craft malicious web pages or links that cause authenticated users to unknowingly perform actions on the vulnerable system. In this case, the vulnerability requires the attacker to have some level of privileges (PR:L) and the victim to interact with a malicious request (UI:R). The CVSS vector indicates network attack vector (AV:N), low attack complexity (AC:L), privileges required (PR:L), user interaction required (UI:R), unchanged scope (S:U), high confidentiality impact (C:H), low integrity impact (I:L), and low availability impact (A:L). This means an attacker can remotely exploit the vulnerability over the network, with low complexity, but must rely on a user with some privileges to interact with the malicious request. The primary risk is unauthorized disclosure or access to sensitive information (high confidentiality impact), with limited potential for data modification or service disruption. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly.

Potential Impact

The primary impact of this CSRF vulnerability is unauthorized actions performed on behalf of authenticated users with some privileges, potentially leading to unauthorized disclosure of sensitive information due to the high confidentiality impact rating. Although integrity and availability impacts are low, attackers could leverage this vulnerability to manipulate administrative functions or gather sensitive data without authorization. Organizations running idccms 1.35, especially those with exposed administrative interfaces, face risks of data breaches and unauthorized configuration changes. The requirement for user interaction and privileges limits the ease of exploitation but does not eliminate the risk, particularly in environments where users have elevated privileges and may be targeted via phishing or malicious websites. The lack of known exploits reduces immediate threat but does not preclude future exploitation. Overall, this vulnerability could undermine trust in the affected system and lead to compliance and reputational damage if exploited.

Mitigation Recommendations

To mitigate CVE-2024-39155, organizations should implement strict anti-CSRF protections on the affected endpoint, such as synchronizer tokens (CSRF tokens) that validate the origin of requests. Web application firewalls (WAFs) can be configured to detect and block suspicious CSRF attempts targeting the /admin/ipRecord_deal.php?mudi=add endpoint. Restricting administrative access to trusted networks or VPNs reduces exposure. Additionally, enforcing least privilege principles to minimize user privileges reduces the impact of potential exploitation. Monitoring and logging administrative actions can help detect anomalous behavior indicative of CSRF exploitation. Since no official patch is currently available, organizations should consider applying custom patches or temporary workarounds, such as disabling the vulnerable functionality if feasible. User education to avoid interacting with untrusted links while authenticated can also reduce risk. Finally, stay updated with vendor advisories for any forthcoming patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c83b7ef31ef0b565c35

Added to database: 2/25/2026, 9:41:23 PM

Last enriched: 2/26/2026, 5:48:41 AM

Last updated: 2/26/2026, 6:14:57 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats