Vulnerabilities > CVE-2015-0923 - Unspecified vulnerability in Ektron Content Management System 8.5.0/8.7.0/8.9.0

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
ektron
metasploit

Summary

The ContentBlockEx method in Workarea/ServerControlWS.asmx in Ektron Content Management System (CMS) 8.5 and 8.7 before 8.7sp2 and 9.0 before sp1 allows remote attackers to read arbitrary files via an external entity declaration in conjunction with an entity reference within an XML document named in the xslt parameter, related to an XML External Entity (XXE) issue.

Metasploit

descriptionEktron 8.5, 8.7 <= sp1, 9.0 < sp1 have vulnerabilities in various operations within the ServerControlWS.asmx web services. These vulnerabilities allow for RCE without authentication and execute in the context of IIS on the remote system.
idMSF:EXPLOIT/WINDOWS/HTTP/EKTRON_XSLT_EXEC_WS
last seen2020-06-08
modified2017-07-24
published2016-10-10
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/ektron_xslt_exec_ws.rb
titleEktron 8.5, 8.7, 9.0 XSLT Transform Remote Code Execution

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/141445/ektron_xslt_exec_ws.rb.txt
idPACKETSTORM:141445
last seen2017-03-04
published2017-03-04
reportercatatonicprime
sourcehttps://packetstormsecurity.com/files/141445/Ektron-8.5-8.7-9.0-XSLT-Transform-Remote-Code-Execution.html
titleEktron 8.5 / 8.7 / 9.0 XSLT Transform Remote Code Execution