Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39157: n/a

0
Low
VulnerabilityCVE-2024-39157cvecve-2024-39157
Published: Thu Jun 27 2024 (06/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-39157 is a Cross-Site Request Forgery (CSRF) vulnerability found in idccms version 1. 35, specifically in the /admin/ipRecord_deal. php component. This vulnerability allows an authenticated user with high privileges to be tricked into executing unwanted actions without their consent. The CVSS score is 3. 8, indicating low severity, with limited impact on confidentiality and integrity and no impact on availability. Exploitation requires the attacker to have the victim authenticated and does not require user interaction beyond the victim visiting a malicious link. No known exploits are currently reported in the wild. Organizations using idccms 1. 35 should prioritize patching or implementing CSRF protections to mitigate this risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:49:12 UTC

Technical Analysis

CVE-2024-39157 identifies a Cross-Site Request Forgery (CSRF) vulnerability in idccms version 1.35, specifically within the administrative endpoint /admin/ipRecord_deal.php?mudi=del&dataType=&dataID=1. CSRF vulnerabilities allow attackers to induce authenticated users to perform unwanted actions on a web application without their consent by exploiting the user's active session. In this case, the vulnerability affects a high-privilege administrative function that handles deletion operations on IP records. The CVSS 3.1 base score of 3.8 reflects a low severity rating, primarily because exploitation requires the attacker to have the victim already authenticated with high privileges (PR:H), and no user interaction beyond visiting a malicious link is needed (UI:N). The attack vector is network-based (AV:N), and the scope is unchanged (S:U). The impact on confidentiality and integrity is limited (C:L, I:L), with no impact on availability (A:N). No patches or known exploits are currently available or reported, indicating this vulnerability is newly disclosed. The underlying weakness corresponds to CWE-352, which is a common web application security issue where anti-CSRF tokens or other protections are missing or insufficient. This vulnerability could allow attackers to manipulate administrative functions such as deleting IP records, potentially disrupting administrative workflows or causing data inconsistencies.

Potential Impact

The primary impact of CVE-2024-39157 is the unauthorized execution of administrative actions by an attacker leveraging an authenticated administrator's session. Although the vulnerability does not allow direct remote code execution or full system compromise, it can lead to unauthorized deletion of IP records, which may affect audit trails, security monitoring, or network management. The limited confidentiality and integrity impact means sensitive data exposure or modification is minimal but still present. Since availability is unaffected, the system remains operational. Organizations relying on idccms for content management or administrative tasks could face operational disruptions or data integrity issues if this vulnerability is exploited. The requirement for high privilege authentication limits the attack surface to administrators or trusted users, reducing the risk of widespread exploitation. However, in environments where administrative credentials are shared or weakly protected, the risk increases. The absence of known exploits in the wild suggests limited immediate threat but highlights the need for proactive mitigation to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2024-39157, organizations should implement robust anti-CSRF protections such as synchronizer tokens or double-submit cookies on all state-changing administrative endpoints, especially /admin/ipRecord_deal.php. Applying strict referer or origin header validation can provide additional defense layers. Limiting administrative access to trusted networks or VPNs reduces exposure. Enforcing multi-factor authentication (MFA) for administrative accounts can mitigate risks from compromised credentials. Regularly auditing and monitoring administrative actions and logs can help detect suspicious activities. If an official patch becomes available, it should be applied promptly. In the absence of patches, consider temporarily disabling or restricting access to vulnerable endpoints. Educating administrators about the risks of CSRF and encouraging safe browsing practices can reduce the likelihood of exploitation. Finally, employing web application firewalls (WAFs) with CSRF detection rules may provide an additional security layer.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c83b7ef31ef0b565c3b

Added to database: 2/25/2026, 9:41:23 PM

Last enriched: 2/26/2026, 5:49:12 AM

Last updated: 2/26/2026, 9:34:23 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats