vendor:
Ektron CMS
by:
Phil Taylor and Nadeem Salim from Sense of Security Labs.
7,5
CVSS
HIGH
Unauthenticated File Upload and XML eXternal Entities (XXE) injection
Not available
CWE
Product Name: Ektron CMS
Affected Version From: Ektron CMS version 8.5.0
Affected Version To: Ektron CMS version 8.6
Patch Exists: YES
Related CWE: Not yet assigned
CPE: Not available
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: ASP.NET
2012
Sense of Security – Security Advisory – SOS-12-009
The form /WorkArea/Upload.aspx does not require authentication to upload a file. By issuing a POST request with a webshell embedded in a JPEG image and specifying the ASPX extension it is possible to upload ASPX code to /uploadedimages/. The ASPX code is placed in the comment section of the JPEG so that it survives image resizing. The XML parser at /WorkArea/Blogs/xmlrpc.aspx is vulnerable to XML external entity attacks which can be used to Scan behind perimeter firewalls or possibly include files from the local file system e.g. <!DOCTYPE scan [<!ENTITY test SYSTEM "http://localhost:22">]> <scan>&test;</scan>
Mitigation:
Upgrade to version 8.6 and remove the /WorkArea/Blogs/xmlrpc.aspx file.