Cyber Posture

CVE-2024-50858

HighPublic PoC

Published: 14 January 2025

Published
14 January 2025
Modified
06 June 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0062 70.2th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-50858 is a high-severity CSRF (CWE-352) vulnerability in Gestioip Gestioip. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 29.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SC-23 (Session Authenticity) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SC-23 enforces session authenticity mechanisms like CSRF tokens and anti-replay protections that directly prevent unauthorized actions via forged requests in authenticated sessions.

prevent

SI-10 requires validation of information inputs, including CSRF tokens, to block malicious forged requests targeting vulnerable endpoints.

prevent

IA-11 mandates re-authentication for privileged operations, mitigating CSRF exploitation on sensitive admin actions by requiring fresh credentials.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CSRF vulnerability in GestioIP v3.5.7 enables exploitation of a public-facing web application, allowing attackers to perform unauthorized actions (data modification, deletion, exfiltration) via forged requests from an authenticated admin's browser.

NVD Description

Multiple endpoints in GestioIP v3.5.7 are vulnerable to Cross-Site Request Forgery (CSRF). An attacker can execute actions via the admin's browser by hosting a malicious URL, leading to data modification, deletion, or exfiltration.

Deeper analysisAI

CVE-2024-50858 is a Cross-Site Request Forgery (CSRF) vulnerability impacting multiple endpoints in GestioIP version 3.5.7, an IP address management tool. Published on 2025-01-14, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and maps to CWE-352 (Cross-Site Request Forgery).

An unauthenticated attacker (PR:N) can exploit this by hosting a malicious URL and tricking an authenticated administrator into visiting it via their browser (UI:R). This enables the attacker to perform unauthorized actions on the victim's behalf, resulting in high-impact consequences such as data modification, deletion, or exfiltration over the network (AV:N) with low attack complexity (AC:L).

Mitigation guidance and additional details are available in vendor and community resources, including the official GestioIP site at http://www.gestioip.net, a CVE-specific repository at https://github.com/maxibelino/CVEs/tree/main/CVE-2024-50858, and a related Docker Compose setup at https://github.com/muebel/gestioip-docker-compose.

Details

CWE(s)

Affected Products

gestioip
gestioip
3.5.7

CVEs Like This One

CVE-2024-48760Same product: Gestioip Gestioip
CVE-2025-2319Shared CWE-352
CVE-2025-23803Shared CWE-352
CVE-2025-25071Shared CWE-352
CVE-2025-23821Shared CWE-352
CVE-2025-30615Shared CWE-352
CVE-2025-22814Shared CWE-352
CVE-2025-28857Shared CWE-352
CVE-2025-28883Shared CWE-352
CVE-2025-27912Shared CWE-352

References