DotNetNuke Remote Arbitrary File Upload Vulnerability
BID:52386
Info
DotNetNuke Remote Arbitrary File Upload Vulnerability
| Bugtraq ID: | 52386 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 09 2012 12:00AM |
| Updated: | Mar 09 2012 12:00AM |
| Credit: | Mark Litchfield from NGSSecure |
| Vulnerable: |
DotNetNuke DotNetNuke 6.0.2 DotNetNuke DotNetNuke 6.0.1 DotNetNuke DotNetNuke 6.1.3 DotNetNuke DotNetNuke 6.1.2 DotNetNuke DotNetNuke 6.1.0 DotNetNuke DotNetNuke 6.0 |
| Not Vulnerable: |
DotNetNuke DotNetNuke 6.1.4 |
Discussion
DotNetNuke Remote Arbitrary File Upload Vulnerability
DotNetNuke is prone to a remote arbitrary file-upload vulnerability because it fails to sufficiently sanitize user-supplied input.
Attackers can exploit this issue to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.
DotNetNuke 6.0.0 through 6.1.3 are vulnerable.
DotNetNuke is prone to a remote arbitrary file-upload vulnerability because it fails to sufficiently sanitize user-supplied input.
Attackers can exploit this issue to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.
DotNetNuke 6.0.0 through 6.1.3 are vulnerable.
Exploit / POC
DotNetNuke Remote Arbitrary File Upload Vulnerability
Attackers can use a browser to exploit this issue.
Attackers can use a browser to exploit this issue.
Solution / Fix
DotNetNuke Remote Arbitrary File Upload Vulnerability
Solution:
Updates are available. Please see the reference for more details.
Solution:
Updates are available. Please see the reference for more details.
References
DotNetNuke Remote Arbitrary File Upload Vulnerability
References:
References:
- DotNetNuke Homepage (DotNetNuke)
- Filemanager function fails to check for valid file extensions (DotNetNuke)