Vulnerable Systems:
* Ektron CMS version 8.5 and prior
Immune Systems:
* Ektron CMS version 8.6
1.Unauthenticated File Upload:
The form /WorkArea/Upload.aspx does not require authentication to upload a file. By issuing a POST request with a webshell embedded in a JPEG image and specifying the ASPX extension it is possible to upload ASPX code to /uploadedimages/. The ASPX code is placed in the comment section of the JPEG so that it survives image resizing.
2.XXE Injection:
The XML parser at /WorkArea/Blogs/xmlrpc.aspx is vulnerable to XML external entity attacks which can be used to Scan behind perimeter firewalls or possibly include files from the local file system e.g.
<!DOCTYPE scan [<!ENTITY test SYSTEM "http://localhost:22">]>
Disclosure Timeline:
Vendor Notification Date 07-May-2012
Release Date 05-Sep-2012