exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

DotNetNuke SaveAsPDF 1.0 Arbitrary File Download

DotNetNuke SaveAsPDF 1.0 Arbitrary File Download
Posted Mar 11, 2019
Authored by KingSkrupellos

DotNetNuke SaveAsPDF module version 1.0 suffers from an arbitrary file download vulnerability.

tags | exploit, arbitrary, info disclosure
SHA-256 | 15af5e545f6db820e456fdadbd6efe9682cffaede9aa8deff0ba5513efdae663

DotNetNuke SaveAsPDF 1.0 Arbitrary File Download

Change Mirror Download
####################################################################

# Exploit Title : DotNetNuke SaveAsPDF Modules 1.0 Arbitrary File Download
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 12/03/2019
# Vendor Homepage : bizmodules.net ~ dnnsoftware.com
# Software Information Links :
bizmodules.net/Products/SaveasPDF/tabid/188/Default.aspx
bizmodules.net/portals/0/downloads/sap.pdf
# Software Version : 1.0 ~ Compatible with DNN 4.5.x and 5.0.x
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Vulnerability Type :
CWE-200 [ Information Exposure ]
CWE-23 [ Relative Path Traversal ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
# CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
# Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos

####################################################################

# Description about Software :
***************************
Save As PDF (SAP) is a DotNetNuke (DNN) application designed to work in DotNetNuke

websites only. SAP is used to convert a DotNetNuke page to Adobe PDF format, including

texts, pictures and even flash contents.

####################################################################

# Impact :
***********
* DotNetNuke SaveAsPDF Modules 1.0 is prone to a vulnerability that lets attackers download

arbitrary files because the application fails to sufficiently sanitize user-supplied input.

An attacker can exploit this issue to download arbitrary files within the context of the

web server process and obtain potentially sensitive informations and it works for

open redirection vulnerability.

* An information exposure is the intentional or unintentional disclosure of information to an actor

that is not explicitly authorized to have access to that information.

* The software uses external input to construct a pathname that should be within a

restricted directory, but it does not properly neutralize sequences such as ".." that

can resolve to a location that is outside of that directory.

####################################################################

# Arbitrary File Download Exploit :
*******************************
/DesktopModules/SaveAsPDF/DownloadPdf.aspx?url=https://www.[RANDOMWEBSITE].gov

/DesktopModules/SaveAsPDF/DownloadPdf.aspx?Name=[ID-NUMBER]&Url=[FILENAME]

/DesktopModules/SaveAsPDF/DownloadPdf.aspx?Name=[ID-NUMBER]&file=[FILENAME]

Note : It can download any random website as pdf file in to your computer and

it downloads a system files from DNNSoftware.

####################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team

####################################################################
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close