CVE-2024-32640
MasaCMS vulnerability analysis and mitigation

Overview

A critical SQL injection vulnerability (CVE-2024-32640) was discovered in Mura/Masa CMS affecting versions 7.2, 7.3, and 7.4. The vulnerability exists in the processAsyncObject API method, allowing a remote authenticated attacker to achieve SQL injection through the contenthistid parameter (ProjectDiscovery Blog, Seebug).

Technical details

The vulnerability exists in the JSON API's processAsyncObject method where the ContentHistID parameter is not properly sanitized in SQL queries. The exploitation requires setting the previewID parameter to trigger the isOnDisplay property. The attack can be executed by sending a specially crafted request to '/_api/json/v1/default/?method=processAsyncObject&object=displayregion&contenthistid=x%5c'&previewID=x' endpoint (ProjectDiscovery Blog).

Impact

Successful exploitation of this vulnerability could lead to unauthorized access to sensitive data and potentially remote code execution. In a proof-of-concept demonstration, researchers were able to reset admin passwords, obtain reset tokens, and achieve RCE through plugin installation capabilities (ProjectDiscovery Blog).

Mitigation and workarounds

Users are advised to update to the patched versions immediately: Masa CMS version 7.4.6, 7.3.13, or 7.2.8. These versions include security patches for this vulnerability and other critical issues (MasaCMS Release).

Community reactions

Apple, which was affected by this vulnerability, responded swiftly and implemented a fix within 2 hours of the initial report. The Masa CMS team was transparent about the issue and released patched versions promptly. However, the Mura CMS team did not respond to multiple attempts at communication regarding these vulnerabilities (ProjectDiscovery Blog).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management