EPiServer Ektron CMS up to 8.02 SP4 XSL Data ekajaxtransform.aspx XslCompiledTransform data processing
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
8.2 | $0-$5k | 0.00 |
A vulnerability classified as critical was found in EPiServer Ektron CMS up to 8.02 SP4 (Content Management System). This vulnerability affects the function XslCompiledTransform
of the file ekajaxtransform.aspx of the component XSL Data Handler. The manipulation with an unknown input leads to a data processing vulnerability. The CWE definition for the vulnerability is CWE-19. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
Ektron Content Management System (CMS) before 8.02 SP5 uses the XslCompiledTransform class with enablescript set to true, which allows remote attackers to execute arbitrary code with NETWORK SERVICE privileges via crafted XSL data.
The bug was discovered 10/16/2012. The weakness was shared 10/30/2017 (Website). The advisory is shared for download at documentation.ektron.com. This vulnerability was named CVE-2012-5357 since 10/10/2012. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. There are known technical details, but no exploit is available.
It is declared as highly functional. The vulnerability was handled as a non-public zero-day exploit for at least 10 days. During that time the estimated underground price was around $0-$5k. By approaching the search of inurl:ekajaxtransform.aspx it is possible to find vulnerable targets with Google Hacking. The vulnerability scanner Nessus provides a plugin with the ID 63245 (Ektron CMS XslCompiledTransform Class Request Parsing Remote Code Execution), which helps to determine the existence of the flaw in a target environment. It is assigned to the family CGI abuses and running in the context r.
Applying the patch 8.02 SP5 is able to eliminate this problem. A possible mitigation has been published even before and not after the disclosure of the vulnerability.
The vulnerability is also documented in the vulnerability database at Tenable (63245). The entry 108785 is related to this item.
Product
Type
Vendor
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 8.5VulDB Meta Temp Score: 8.4
VulDB Base Score: 7.3
VulDB Temp Score: 7.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 9.8
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Data processingCWE: CWE-19
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Status: Highly functional
Google Hack: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 63245
Nessus Name: Ektron CMS XslCompiledTransform Class Request Parsing Remote Code Execution
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
OpenVAS ID: 103369
OpenVAS Name: Ektron CMS XslCompiledTransform Class Remote Code Execution Vulnerability
OpenVAS File: 🔍
OpenVAS Family: 🔍
MetaSploit ID: ektron_xslt_exec.rb
MetaSploit Name: Ektron 8.02 XSLT Transform Remote Code Execution
MetaSploit File: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Patch: 8.02 SP5
Timeline
10/10/2012 🔍10/16/2012 🔍
10/26/2012 🔍
12/05/2012 🔍
12/12/2012 🔍
10/30/2017 🔍
10/30/2017 🔍
10/31/2017 🔍
01/21/2021 🔍
Sources
Advisory: documentation.ektron.comResearcher: Richard Lundeen
Status: Not defined
Confirmation: 🔍
CVE: CVE-2012-5357 (🔍)
SecurityFocus: 56816
OSVDB: 88107 - CVE-2012-5357 - Ektron - Ektron Content Management System - High
See also: 🔍
Entry
Created: 10/31/2017 07:50Updated: 01/21/2021 09:19
Changes: 10/31/2017 07:50 (76), 04/01/2020 16:50 (6), 01/21/2021 09:19 (5)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.