search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Lomtec ActiveWeb Professional 3.0 CMS allows arbitrary file upload and execution

Vulnerability Note VU#528212

Original Release Date: 2011-01-25 | Last Revised: 2011-01-25

Overview

Lomtec ActiveWeb Professional 3.0 web content management server allows unauthenticated users to upload arbitrary files.

Description

According to Lomtec's website: "Lomtec ActiveWeb offers an ideal solution for the creation, maintenance and administration of a Web site and its content." Lomtec ActiveWeb Professional 3.0 web content management server, running on ColdFusion, allows unauthenticated users to upload arbitrary files. By accessing the "getImagefile" section of the EasyEdit module, a remote attacker could upload an executable server-side script (e.g., an .asp shell on a Microsoft Internet Information Server platform) and execute arbitrary commands with the privileges of the web content management server.

Impact

By uploading a file that can be executed by the web server (e.g., an .asp shell), a remote, authenticated attacker may be able to execute arbitrary code with the privileges of the web content management server.

Solution

We are currently unaware of a practical solution to this problem.

Restrict Access

Limit network access to hosts that require connections to the web content management server. Do not allow access to the web content management server from untrusted networks such as the internet.

Filter URLs

Using a reverse HTTP proxy, web server URL filtering, or similar technology, it may be possible to restrict the names and extensions of files that can be uploaded to the web content management server.

Modify Web Server Permissions

It may be possible to modify web content management server permissions to prevent file uploads. This may impact web content management server functionality.

Vendor Information

528212
 
Affected   Unknown   Unaffected

Lomtec

Updated:  January 20, 2011

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Acknowledgements

Thanks to StenoPlasma at ExploitDevelopment for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

CVE IDs: None
Severity Metric: 5.36
Date Public: 2011-01-28
Date First Published: 2011-01-25
Date Last Updated: 2011-01-25 13:42 UTC
Document Revision: 14

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.