what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Lomtec ActiveWeb Professional 3.0 CMS Shell Upload / SYSTEM Execution

Lomtec ActiveWeb Professional 3.0 CMS Shell Upload / SYSTEM Execution
Posted Jan 27, 2011
Authored by StenoPlasma | Site exploitdevelopment.com

Lomtec ActiveWeb Professional 3.0 CMS allows for arbitrary file upload and execution as SYSTEM in ColdFusion.

tags | exploit, arbitrary, file upload
SHA-256 | 78494c3386ff463a2ce2a536380cd254dc574d5098b1fb4f4bc4d3c6534f5261

Lomtec ActiveWeb Professional 3.0 CMS Shell Upload / SYSTEM Execution

Change Mirror Download
-------------------------------------------------------------------------------------
www.ExploitDevelopment.com 2010-WEB-002
(CERT VU#870532) (Security Focus BID 45985)
-------------------------------------------------------------------------------------

TITLE:
Lomtec ActiveWeb Professional 3.0 CMS Allows Arbitrary File Upload and
Execution as SYSTEM in ColdFusion

SUMMARY AND IMPACT:
The ActiveWeb Professional 3.0 web content management server is
vulnerable to remote operating system takeover. An unauthenticated
remote user can upload malicious files and backdoor ColdFusion
websites using the EasyEdit.cfm page. By accessing the "getImagefile"
section of the EasyEdit module, the remote attacker can change hidden
form fields to upload malicious applications and ColdFusion CFML
websites that execute those malicious applications or operating system
commands in the context of the ColdFusion service account (SYSTEM).
The remote user can now perform all functions of the system
administrator using uploaded CFML pages. The attacker can create a
SYSTEM level shell connection back to the attacker's computer, add
local administrator accounts, gather information about the victim
company's network or set up a sniffer to capture passwords. Other
pages on the ActiveWeb Professional CMS allow unauthenticated users to
perform directory listings of the entire Microsoft Windows operating
system.

DETAILS:
Use the following steps to exploit this vulnerability.

Step 1: Access the ActiveWeb Get Image File Module.
http://VICTIMIP/activeweb/EasyEdit.cfm?module=EasyEdit&page=getimagefile&Filter=
Step 2: Using Mozilla FireFox with the Web Developer Toolbar, change
the UploadDirectory hidden form field to C:\. Change the Accepted
Extensions hidden form field to exe. Now you can upload the malicious
application (Example would be Netcat.exe).
Step 3: Using Mozilla FireFox with the Web Developer Toolbar, change
the UploadDirectory hidden form field to
c:\activeweb\activeweb\wwwroot\. Change the Accepted Extensions hidden
form field to cfml. Upload your backdoor NetCat.cfml ColdFusion page
that calls CFEXECUTE to run the malicious application.
Step 4: Using Netcat.exe on the attacker's machine, listen for the
VICTIM server's remote shell.
Step 5: Using Mozilla FireFox, access the newly uploaded NetCat.cfml
backdoor page via http://VICTIMIP/activeweb/NetCat.cfml.
Step 6: You will now get a remote shell on your NetCat listener
running as the ColdFusion service account (Default is SYSTEM on
Microsoft Windows).

VULNERABLE PRODUCTS:
Lomtec ActiveWeb Professional 3.0

REFERENCES AND ADDITIONAL INFORMATION:
N/A

CREDITS:
StenoPlasma (at) ExploitDevelopment.com

TIMELINE:
Discovery: December 16, 2008
Vendor Notified: May 6, 2010 (No response from vendor)
Vendor Notified Attempt 2: May 10, 2010 (No response from vendor)
Vendor Notified Attempt 3: May 19, 2010 (No response from vendor)
Vendor Fixed: N/A
Vendor Notified of Disclosure: N/A
Disclosure to CERT: December 2, 2010
CERT Published: January 25, 2011

VENDOR URL:
http://www.lomtec.com

ADVISORY URL:
http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-002.html
http://www.kb.cert.org/vuls/id/528212
http://www.securityfocus.com/bid/45985/info

VENDOR ADVISORY URL:
N/A

-----------------------------------------------------
StenoPlasma at ExploitDevelopment.com
www.ExploitDevelopment.com
-----------------------------------------------------
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close