Executive Summary

Summary
Title Lomtec ActiveWeb Professional 3.0 CMS allows arbitrary file upload and execution
Informations
Name VU#528212 First vendor Publication 2011-01-25
Vendor VU-CERT Last vendor Modification 2011-01-25
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 6.8 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#528212

Lomtec ActiveWeb Professional 3.0 CMS allows arbitrary file upload and execution

Overview

Lomtec ActiveWeb Professional 3.0 web content management server allows unauthenticated users to upload arbitrary files.

I. Description

According to Lomtec's website: "Lomtec ActiveWeb offers an ideal solution for the creation, maintenance and administration of a Web site and its content." Lomtec ActiveWeb Professional 3.0 web content management server, running on ColdFusion, allows unauthenticated users to upload arbitrary files. By accessing the "getImagefile" section of the EasyEdit module, a remote attacker could upload an executable server-side script (e.g., an .asp shell on a Microsoft Internet Information Server platform) and execute arbitrary commands with the privileges of the web content management server.

II. Impact

By uploading a file that can be executed by the web server (e.g., an .asp shell), a remote, authenticated attacker may be able to execute arbitrary code with the privileges of the web content management server.

III. Solution

We are currently unaware of a practical solution to this problem.

Restrict Access

Limit network access to hosts that require connections to the web content management server. Do not allow access to the web content management server from untrusted networks such as the internet.

Filter URLs

Using a reverse HTTP proxy, web server URL filtering, or similar technology, it may be possible to restrict the names and extensions of files that can be uploaded to the web content management server.

Modify Web Server Permissions

It may be possible to modify web content management server permissions to prevent file uploads. This may impact web content management server functionality.

Vendor Information

VendorStatusDate NotifiedDate Updated
LomtecAffected2011-01-20

References

http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-002.html

Credit

Thanks to StenoPlasma at ExploitDevelopment for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

Date Public:2011-01-28
Date First Published:2011-01-25
Date Last Updated:2011-01-25
CERT Advisory: 
CVE-ID(s): 
NVD-ID(s): 
US-CERT Technical Alerts: 
Severity Metric:5.36
Document Revision:14

Original Source

Url : http://www.kb.cert.org/vuls/id/528212

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Open Source Vulnerability Database (OSVDB)

Id Description
70669 ActiveWeb Professional EasyEdit.cfm getImagefile Arbitrary File Upload

ActiveWeb Professional contains a flaw related to the EasyEdit.cfm script allowing the upload of arbitrary files to within the web root. This may allow a remote attacker to execute arbitrary CFM code.