Vulnerability Note VU#528212

Lomtec ActiveWeb Professional 3.0 CMS allows arbitrary file upload and execution

Original Release date: 25 Jan 2011 | Last revised: 25 Jan 2011

Overview

Lomtec ActiveWeb Professional 3.0 web content management server allows unauthenticated users to upload arbitrary files.

Description

According to Lomtec's website: "Lomtec ActiveWeb offers an ideal solution for the creation, maintenance and administration of a Web site and its content." Lomtec ActiveWeb Professional 3.0 web content management server, running on ColdFusion, allows unauthenticated users to upload arbitrary files. By accessing the "getImagefile" section of the EasyEdit module, a remote attacker could upload an executable server-side script (e.g., an .asp shell on a Microsoft Internet Information Server platform) and execute arbitrary commands with the privileges of the web content management server.

Impact

By uploading a file that can be executed by the web server (e.g., an .asp shell), a remote, authenticated attacker may be able to execute arbitrary code with the privileges of the web content management server.

Solution

We are currently unaware of a practical solution to this problem.

Restrict Access

Limit network access to hosts that require connections to the web content management server. Do not allow access to the web content management server from untrusted networks such as the internet.

Filter URLs

Using a reverse HTTP proxy, web server URL filtering, or similar technology, it may be possible to restrict the names and extensions of files that can be uploaded to the web content management server.

Modify Web Server Permissions

It may be possible to modify web content management server permissions to prevent file uploads. This may impact web content management server functionality.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
LomtecAffected-20 Jan 2011
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Thanks to StenoPlasma at ExploitDevelopment for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

  • CVE IDs: Unknown
  • Date Public: 28 Jan 2011
  • Date First Published: 25 Jan 2011
  • Date Last Updated: 25 Jan 2011
  • Severity Metric: 5.36
  • Document Revision: 14

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.