CVE-2024-51144
Product detail ⌗
Multiple Cross-Site Request Forgery (CSRF) vulnerabilities exist in the private messaging and follower/following functions in Ampache versions up to 6.6.0. These vulnerabilities affect the endpoints 'pvmsg.php?action=add_message', 'pvmsg.php?action=confirm_delete', and 'ajax.server.php?page=user&action=flip_follow', allowing malicious users to perform unauthorized actions such as sending or deleting private messages and following or unfollowing users without consent.
Prerequisite ⌗
Install Ampache from official Ampache Github repository GitHub page


Ampache version 6.6.0 released on Aug 1

Installed Ampache version 6.6.0
Exploitation ⌗
The form_validation parameter is used for anti-CSRF in many APIs, including admin functions.
The below image shows that if form_validation value is not valid or removed the request, the server response with 403 Access denied in this case.

However, for actions like sending or deleting private messages, as well as following or unfollowing users, the form_validation parameter is not utilized.
We can send an empty value or remove the parameter, and the server will still accept the request.
For the send private message API, although the form_validation parameter exists.

it can be bypassed by removing a parameter.

For the delete private message API is the same case as send private message.

But we can send an empty value or remove the parameter as well.

In the case of follow/unfollow actions, there is no use of the form_validation parameter or any anti-CSRF token.

Use the CSRF HTML code below to demonstrate the attack, where the victim must click the button.
CSRF Attack
CSRF case: send private message

CSRF case: delete private message

CSRF case: follow/unfollow
