8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
DNN.Platform is vulnerable to remote code execution (RCE). This is due to the application storing profile information for users in the DNNPersonalization cookie as XML and the structure includes a type
attribute that instructs the server the type of object to create upon deserialization. The deserialization vulnerability in the cookie allows a remote attacker to execute arbitrary code on the system by submitting a malicious cookie to the server.
CPE | Name | Operator | Version |
---|---|---|---|
dnn.platform | le | 9.1.0 | |
dotnetnuke.core | le | 9.1.1.129 |
packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html
www.dnnsoftware.com/community/security/security-center
www.securityfocus.com/bid/102213
github.com/dnnsoftware/Dnn.Platform/pull/1743
github.com/rapid7/metasploit-framework/pull/12096/commits/b9c2ec60f5edcc776ff7cedbf026cb6184363b83
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P