Lucene search

K
canvasImmunity CanvasFCKEDITOR
HistoryJul 05, 2009 - 4:30 p.m.

Immunity Canvas: FCKEDITOR

2009-07-0516:30:00
Immunity Canvas
exploitlist.immunityinc.com
325

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.973 High

EPSS

Percentile

99.8%

Name FCKEditor
CVE CVE-2009-2265 Exploit Pack
VENDOR:
Known Vunlerable Versions: [โ€˜ColdFusion MX 8 - 8.01โ€™, โ€˜osCMax <=2.0โ€™, โ€˜RunCMS <=1.3aโ€™, โ€˜Falt4 CMSโ€™, โ€˜Many more to come!โ€™]
Notes: This exploit has two different variants - one for Windows on ColdFusion and another for Apache. The Default will get you a shell on ColdFusion MX 8.0 and MX 8.0.1.

ColdFusion/IIS: To exploit this successfully you have to win a race condition - this exploit module dramatically increases your odds of getting a shell (in fact it doesnโ€™t stop until it does or you stop it). Due to the nature of the exploit you may get more than 1 shell to appear (because we can win the race again before the module
has a chance to stop trying). We first send a ColdFusion module up to the server that, when executed, will dump a MOSDEF trojan onto the webserver in the format of CFAdminYYZZ.exe.

This MOSDEF shell will be running as user SYSTEM. The default behavior of this exploit is to attack ColdFusion on IIS.

Apache: There are many applications that use FCKEditor and the attack vector varies as a result. This module attempts a combination of many known attack vectors but can be โ€˜noisyโ€™

In the โ€˜autoversionโ€™ mode it will attempt to find vulnerable installations of a few known applications that are known to be vulnerable.
In the โ€˜customโ€™ mode you can supply a path to your own connector believed to be vulnerable and CANVAS will attempt a variety of combinations
to get a shell uploaded and executed.

Be mindful to supply the correct basepath so CANVAS can build the URLs correctly!

Due to the race condition the generated CFAdminYYZZ.cfm file may not be deleted from the /UserFiles/File folder. You may have to do this manually
Repeatability: Infinite
References: [โ€˜http://www.adobe.com/support/security/bulletins/apsb09-09.html (ColdFusion)โ€™]
Date public: 7/8/2009
CVE URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2265
Google Dorks: [โ€˜inurl:cfm/cf5_connector.cfmโ€™, โ€˜inurl:cfm/cf5_upload.cfmโ€™, โ€˜inurl:php/connector.phpโ€™]
CVSS: 7.5

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.973 High

EPSS

Percentile

99.8%