Vulnerability Note VU#528212
Lomtec ActiveWeb Professional 3.0 CMS allows arbitrary file upload and execution
Lomtec ActiveWeb Professional 3.0 web content management server allows unauthenticated users to upload arbitrary files.
According to Lomtec's website: "Lomtec ActiveWeb offers an ideal solution for the creation, maintenance and administration of a Web site and its content." Lomtec ActiveWeb Professional 3.0 web content management server, running on ColdFusion, allows unauthenticated users to upload arbitrary files. By accessing the "getImagefile" section of the EasyEdit module, a remote attacker could upload an executable server-side script (e.g., an .asp shell on a Microsoft Internet Information Server platform) and execute arbitrary commands with the privileges of the web content management server.
By uploading a file that can be executed by the web server (e.g., an .asp shell), a remote, authenticated attacker may be able to execute arbitrary code with the privileges of the web content management server.
We are currently unaware of a practical solution to this problem.
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Lomtec||Affected||-||20 Jan 2011|
CVSS Metrics (Learn More)
Thanks to StenoPlasma at ExploitDevelopment for reporting this vulnerability.
This document was written by Michael Orlando.
- CVE IDs: Unknown
- Date Public: 28 Jan 2011
- Date First Published: 25 Jan 2011
- Date Last Updated: 25 Jan 2011
- Severity Metric: 5.36
- Document Revision: 14
If you have feedback, comments, or additional information about this vulnerability, please send us email.