KBVault MySQL 0.16a Arbitrary File Upload

Credit: Fatih Emiral
Risk: High
Local: No
Remote: Yes
CWE: CWE-264

CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

# Exploit Title: [KBVault MySQL v0.16a - Unauthenticated File Upload to Run Code] # Google Dork: [inurl:"FileExplorer/Explorer.aspx"] # Date: [2017-06-14] # Exploit Author: [Fatih Emiral] # Vendor Homepage: [http://kbvaultmysql.codeplex.com/] # Software Link: [http://kbvaultmysql.codeplex.com/downloads/get/858806] # Version: [0.16a] # Tested on: [Windows 7 (applicable to all Windows platforms)] # CVE : [CVE-2017-9602] 1. Description KBVault Mysql Free Knowledge Base application package comes with a third party file management component. An unauthenticated user can access the file upload (and delete) functionality using the following URI: http://host/FileExplorer/Explorer.aspx?id=/Uploads 2. Exploit Through this functionality a user can upload an ASPX script to run any arbitrary code, e.g.: http://host/Uploads/Documents/cmd.aspx 3. Solution Unauthenticated access to the file management function should be prohibited. File uploads should be checked against executable formats, and only acceptable file types should be allowed to upload. 4. Disclosure Timeline 2017-06-09: Vendor notification 2017-06-09: Vendor responded with intention to fix the vulnerability 2017-06-12: CVE number acquired 2017-06-15: Public disclosure

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2017, cxsecurity.com


Back to Top