CVE-2024-51144: n/a
Cross Site Request Forgery (CSRF) vulnerability exists in the 'pvmsg.php?action=add_message', pvmsg.php?action=confirm_delete , and ajax.server.php?page=user&action=flip_follow endpoints in Ampache <= 6.6.0.
AI Analysis
Technical Summary
CVE-2024-51144 is a high-severity Cross Site Request Forgery (CSRF) vulnerability affecting Ampache versions up to and including 6.6.0. Ampache is an open-source web-based audio streaming application, widely used for managing and streaming personal music collections. The vulnerability resides in three specific endpoints: 'pvmsg.php?action=add_message', 'pvmsg.php?action=confirm_delete', and 'ajax.server.php?page=user&action=flip_follow'. These endpoints do not adequately verify the origin of requests, allowing an attacker to craft malicious web pages that, when visited by an authenticated Ampache user, can trigger unauthorized actions on their behalf without their consent. The CVSS v3.1 score of 8.8 reflects the critical nature of this vulnerability, indicating that it can be exploited remotely over the network without any privileges (AV:N/AC:L/PR:N), but requires user interaction (UI:R). Successful exploitation can lead to full compromise of confidentiality, integrity, and availability of the affected Ampache instance, as the attacker can add messages, delete confirmations, or flip follow states, potentially disrupting user data and application behavior. Although no known exploits are currently reported in the wild, the vulnerability's ease of exploitation and impact make it a significant threat. The lack of available patches at the time of publication further increases the urgency for mitigation.
Potential Impact
For European organizations using Ampache, particularly those relying on it for internal or customer-facing audio streaming services, this vulnerability poses a serious risk. Exploitation could lead to unauthorized manipulation of user data, disruption of service availability, and potential leakage of sensitive information. Organizations in sectors such as media, education, and entertainment that utilize Ampache for content distribution could face operational disruptions and reputational damage. Additionally, given the high confidentiality impact, personal user data managed through Ampache could be exposed or altered, potentially violating GDPR requirements and leading to regulatory penalties. The remote exploitability without authentication means attackers can target users through phishing or malicious websites, increasing the attack surface. The absence of patches necessitates immediate attention to prevent exploitation, especially in environments where Ampache is accessible over the internet.
Mitigation Recommendations
1. Immediately restrict external access to Ampache instances by implementing network-level controls such as firewalls or VPNs to limit usage to trusted internal networks. 2. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attack patterns targeting the vulnerable endpoints. 3. Advise users to avoid clicking on untrusted links or visiting suspicious websites while logged into Ampache to reduce the risk of CSRF exploitation. 4. Monitor web server logs for unusual POST requests to the affected endpoints that could indicate attempted exploitation. 5. If possible, temporarily disable or restrict functionality of the vulnerable endpoints until an official patch is released. 6. Engage with the Ampache community or maintainers to track patch releases and apply updates promptly once available. 7. Implement additional CSRF protections such as synchronizer tokens or same-site cookies if custom modifications to the Ampache codebase are feasible. 8. Conduct user awareness training focused on phishing and social engineering risks that could facilitate CSRF attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2024-51144: n/a
Description
Cross Site Request Forgery (CSRF) vulnerability exists in the 'pvmsg.php?action=add_message', pvmsg.php?action=confirm_delete , and ajax.server.php?page=user&action=flip_follow endpoints in Ampache <= 6.6.0.
AI-Powered Analysis
Technical Analysis
CVE-2024-51144 is a high-severity Cross Site Request Forgery (CSRF) vulnerability affecting Ampache versions up to and including 6.6.0. Ampache is an open-source web-based audio streaming application, widely used for managing and streaming personal music collections. The vulnerability resides in three specific endpoints: 'pvmsg.php?action=add_message', 'pvmsg.php?action=confirm_delete', and 'ajax.server.php?page=user&action=flip_follow'. These endpoints do not adequately verify the origin of requests, allowing an attacker to craft malicious web pages that, when visited by an authenticated Ampache user, can trigger unauthorized actions on their behalf without their consent. The CVSS v3.1 score of 8.8 reflects the critical nature of this vulnerability, indicating that it can be exploited remotely over the network without any privileges (AV:N/AC:L/PR:N), but requires user interaction (UI:R). Successful exploitation can lead to full compromise of confidentiality, integrity, and availability of the affected Ampache instance, as the attacker can add messages, delete confirmations, or flip follow states, potentially disrupting user data and application behavior. Although no known exploits are currently reported in the wild, the vulnerability's ease of exploitation and impact make it a significant threat. The lack of available patches at the time of publication further increases the urgency for mitigation.
Potential Impact
For European organizations using Ampache, particularly those relying on it for internal or customer-facing audio streaming services, this vulnerability poses a serious risk. Exploitation could lead to unauthorized manipulation of user data, disruption of service availability, and potential leakage of sensitive information. Organizations in sectors such as media, education, and entertainment that utilize Ampache for content distribution could face operational disruptions and reputational damage. Additionally, given the high confidentiality impact, personal user data managed through Ampache could be exposed or altered, potentially violating GDPR requirements and leading to regulatory penalties. The remote exploitability without authentication means attackers can target users through phishing or malicious websites, increasing the attack surface. The absence of patches necessitates immediate attention to prevent exploitation, especially in environments where Ampache is accessible over the internet.
Mitigation Recommendations
1. Immediately restrict external access to Ampache instances by implementing network-level controls such as firewalls or VPNs to limit usage to trusted internal networks. 2. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attack patterns targeting the vulnerable endpoints. 3. Advise users to avoid clicking on untrusted links or visiting suspicious websites while logged into Ampache to reduce the risk of CSRF exploitation. 4. Monitor web server logs for unusual POST requests to the affected endpoints that could indicate attempted exploitation. 5. If possible, temporarily disable or restrict functionality of the vulnerable endpoints until an official patch is released. 6. Engage with the Ampache community or maintainers to track patch releases and apply updates promptly once available. 7. Implement additional CSRF protections such as synchronizer tokens or same-site cookies if custom modifications to the Ampache codebase are feasible. 8. Conduct user awareness training focused on phishing and social engineering risks that could facilitate CSRF attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-10-28T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e0f3c4b66c7f7acdd3ea24
Added to database: 10/4/2025, 10:15:32 AM
Last enriched: 10/4/2025, 10:25:56 AM
Last updated: 10/16/2025, 12:41:55 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.