Lucene search

K
packetstormJarad KopfPACKETSTORM:153274
HistoryJun 13, 2019 - 12:00 a.m.

Sitecore 8.x Deserialization Remote Code Execution

2019-06-1300:00:00
Jarad Kopf
packetstormsecurity.com
96

0.05 Low

EPSS

Percentile

92.9%

`# Exploit Title: Sitecore v 8.x Deserialization RCE  
# Date: Reported to vendor October 2018, fix released April 2019.  
# Exploit Author: Jarad Kopf  
# Vendor Homepage: https://www.sitecore.com/  
# Software Link: Sitecore downloads: https://dev.sitecore.net/Downloads.aspx  
# Version: Sitecore 8.0 Revision 150802  
# Tested on: Windows  
# CVE : CVE-2019-11080   
  
Exploit:   
  
Authentication is needed for this exploit. An attacker needs to login to Sitecore 8.0 revision 150802's Admin section.   
When choosing to Serializeusers or domains in the admin UI, calls to /sitecore/shell/~/xaml/Sitecore.Shell.Applications.Dialogs.Progress.aspx will include a CSRFTOKEN parameter.   
By replacing this parameter with a URL-encoded, base64-encoded crafted payload from ysoserial.net, an RCE is successful.  
`

0.05 Low

EPSS

Percentile

92.9%