Vulnerabilities > CVE-2015-0923 - Unspecified vulnerability in Ektron Content Management System 8.5.0/8.7.0/8.9.0

047910
CVSS 5.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
low complexity
ektron
metasploit

Summary

The ContentBlockEx method in Workarea/ServerControlWS.asmx in Ektron Content Management System (CMS) 8.5 and 8.7 before 8.7sp2 and 9.0 before sp1 allows remote attackers to read arbitrary files via an external entity declaration in conjunction with an entity reference within an XML document named in the xslt parameter, related to an XML External Entity (XXE) issue. <a href="http://cwe.mitre.org/data/definitions/611.html">CWE-611: Improper Restriction of XML External Entity Reference ('XXE')</a>

Metasploit

descriptionEktron 8.5, 8.7 <= sp1, 9.0 < sp1 have vulnerabilities in various operations within the ServerControlWS.asmx web services. These vulnerabilities allow for RCE without authentication and execute in the context of IIS on the remote system.
idMSF:EXPLOIT/WINDOWS/HTTP/EKTRON_XSLT_EXEC_WS
last seen2020-06-08
modified2017-07-24
published2016-10-10
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/ektron_xslt_exec_ws.rb
titleEktron 8.5, 8.7, 9.0 XSLT Transform Remote Code Execution

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/141445/ektron_xslt_exec_ws.rb.txt
idPACKETSTORM:141445
last seen2017-03-04
published2017-03-04
reportercatatonicprime
sourcehttps://packetstormsecurity.com/files/141445/Ektron-8.5-8.7-9.0-XSLT-Transform-Remote-Code-Execution.html
titleEktron 8.5 / 8.7 / 9.0 XSLT Transform Remote Code Execution