nights shadow has discovered a vulnerability in 1024 CMS, which can be exploited by malicious people to conduct cross-site request forgery attacks.
The vulnerability is caused due to the application allowing users to perform certain actions via HTTP requests without performing any validity checks to verify the request. This can be exploited to e.g. create files containing arbitrary PHP code on an affected system by enticing a logged-in administrator to visit a malicious site.
Successful exploitation with a different impact may also be possible via the forum functionality.
The vulnerability is confirmed in version 1.2.5. Other versions may also be affected.
Solution: Grant only trusted users access to the application and don't browse untrusted sites while being logged on to the application.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org