what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Umbraco 4.x Open Proxy

Umbraco 4.x Open Proxy
Posted Apr 6, 2012
Authored by Florent Daigniere | Site trustmatta.com

Vulnerable installations of Umbraco allow unauthenticated users to abuse the script FeedProxy.aspx into proxying requests on their behalf through the "url" parameter.

tags | advisory
advisories | CVE-2012-1301
SHA-256 | 19987edc1f1a1fecf2c9df97f5014d7f25ea604cf74d0337f115ba76e02245bc

Umbraco 4.x Open Proxy

Change Mirror Download
Hash: SHA256

Matta Consulting - Matta Advisory

Umbraco Open Proxy Vulnerability

Advisory ID: MATTA-2012-001
CVE reference: CVE-2012-1301
Affected platforms: Umbraco
Version: 4.x
Date: 2012-January-26
Security risk: High
Vulnerability: Umbraco bundles a script behaving like an open-proxy
Researcher: Florent Daigniere
Vendor Status: Notified
Vulnerability Disclosure Policy:
Permanent URL:


Vulnerable installations of Umbraco allow unauthenticated users to
abuse the script FeedProxy.aspx into proxying requests on their
behalf through the "url" parameter.


Anyone with access to the management interface of umbraco can abuse
FeedProxy script into proxying requests for them.

The impact of such vulnerability is difficult to measure and depends
on the specifics of the deployment. Typically, this can allow
attackers to connect to other systems, bypassing controls or be
abused to trick users and browsers into performing actions they
wouldn't otherwise consider (XSS, phishing, ...).

This particular vulnerability can also be abused to create a powerful
Denial of Service: a single recursive proxy-request will take the
application server down and, depending on the configuration of the
server, might severely affect unrelated services.

Versions affected:

Umbraco version 4.7.0 tested.

Threat mitigation

Matta consultants recommend deleting the FeedProxy script or
upgrading umbraco to version 5+.


This vulnerability was discovered and researched by Florent Daigniere
from Matta Consulting.


26-01-12 initial discovery
21-02-12 initial attempt to contact the vendor
24-02-12 second attempt to contact the vendor
27-02-12 third attempt to contact the vendor
27-02-12 response from the vendor \o/
27-02-12 draft of this advisory is sent to the vendor
29-02-12 CVE-2012-1301 is assigned
05-04-12 publication of the advisory

About Matta

Matta is a privately held company with Headquarters in London, and a
European office in Amsterdam. Established in 2001, Matta operates
in Europe, Asia, the Middle East and North America using a respected
team of senior consultants. Matta is an accredited provider of
Tiger Scheme training; conducts regular research and is the developer
behind the webcheck application scanner, and colossus network scanner.


Disclaimer and Copyright

Copyright (c) 2012 Matta Consulting Limited. All rights reserved.
This advisory may be distributed as long as its distribution is
free-of-charge and proper credit is given.

The information provided in this advisory is provided "as is" without
warranty of any kind. Matta Consulting disclaims all warranties, either
express or implied, including the warranties of merchantability and
fitness for a particular purpose. In no event shall Matta Consulting or
its suppliers be liable for any damages whatsoever including direct,
indirect, incidental, consequential, loss of business profits or
special damages, even if Matta Consulting or its suppliers have been
advised of the possibility of such damages.
Version: GnuPG v1.4.12 (GNU/Linux)


Login or Register to add favorites

File Archive:

June 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    18 Files
  • 2
    Jun 2nd
    13 Files
  • 3
    Jun 3rd
    0 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    0 Files
  • 7
    Jun 7th
    0 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    0 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By