CVE-2024-57052
Published: 27 January 2025
Summary
CVE-2024-57052 is a critical-severity Session Fixation (CWE-384) vulnerability in Youdiancms Youdiancms. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 20.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Validates and sanitizes the sessionID parameter in index.php to prevent manipulation that enables privilege escalation.
Enforces approved authorizations to block unauthorized privilege escalation even if sessionID is improperly handled.
Applies least privilege to limit the impact and success of privilege escalation attempts via sessionID manipulation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct privilege escalation via remote unauthenticated exploitation of a public-facing web app (CWE-384 session handling flaw).
NVD Description
An issue in youdiancms v.9.5.20 and before allows a remote attacker to escalate privileges via the sessionID parameter in the index.php file.
Deeper analysisAI
CVE-2024-57052 is a privilege escalation vulnerability affecting youdiancms versions 9.5.20 and earlier. The issue stems from improper handling of the sessionID parameter in the index.php file, enabling remote attackers to escalate their privileges. It is associated with CWE-384 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical.
Any remote attacker can exploit this vulnerability without authentication, privileges, or user interaction, requiring only network access and low attack complexity. Successful exploitation allows the attacker to achieve high impacts on confidentiality, integrity, and availability, potentially leading to full system compromise through elevated privileges.
A related advisory is documented at https://gist.github.com/yahaha9/720fb45bbebda62dc198568c8d275df8.
Details
- CWE(s)