Информационная безопасность
[RU] switch to English

Дополнительная информация

  Cводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)

  [ MDVSA-2011:006 ] subversion

  Simploo CMS Community Edition - Remote PHP Code Execution Issue

  SQL Injection in Pixie

  SQL Injection in Pixie

From:Daniel Niggebrugge <Niggebrugge_(at)_fox-it.com>
Date:20 января 2011 г.
Subject:DotNetNuke Remote Code Execution vulnerability

Vulnerability discovered: November 23, 2010
Discovered by: Daniël Niggebrugge, Fox-IT BV (https://www.fox-it.com/)
Reported to vendor: November 30, 2010
Fix available: Yes

DotNetNuke is an open source Content Management System (CMS) based on Microsoft
ASP.NET. DotNetNuke powers over 600,000 production web sites worldwide. More
information can be found at:

An anonymous attacker can upload ASPX files, access these files and is then able
to execute arbitrary commands on the web server. This leads to full compromise of
the DotNetNuke environment and possibly compromise of other web applications and/or
information on the web server.

Fox-IT verified DotNetNuke version 05.06.00 (459) to be vulnerable to this issue.

This issue has been fixed in DotNetNuke version 05.06.01. Fox-IT advises to test
and deploy this new version as soon as possible.

The vulnerability is caused by several web pages of DotNetNuke that insufficiently
enforce authorization checks. Depending on the function of the vulnerable web page,
several issues might arise. The most severe issue makes it possible to upload
executable files without proper authorizations and execute arbitrary commands on
the web server.

Original report:

DotNetNuke security bulletin:

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород