Arbitrary code execution vulnerability in Kentico 9 through 11 allows remote authenticated users to execute arbitrary operating system commands in a dynamic .NET code evaluation context via C# code in a "Pages -> Edit -> Template -> Edit template properties -> Layout" box. NOTE: the vendor has responded that there is intended functionality for authorized users to edit and update ascx code layout
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/541790/100/0/threaded | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/541790/100/0/threaded | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 04:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/archive/1/541790/100/0/threaded - Exploit, Third Party Advisory, VDB Entry |
07 Nov 2023, 03:00
Type | Values Removed | Values Added |
---|---|---|
Summary | Arbitrary code execution vulnerability in Kentico 9 through 11 allows remote authenticated users to execute arbitrary operating system commands in a dynamic .NET code evaluation context via C# code in a "Pages -> Edit -> Template -> Edit template properties -> Layout" box. NOTE: the vendor has responded that there is intended functionality for authorized users to edit and update ascx code layout |
Information
Published : 2018-02-20 15:29
Updated : 2024-11-21 04:11
NVD link : CVE-2018-7046
Mitre link : CVE-2018-7046
CVE.ORG link : CVE-2018-7046
JSON object : View
Products Affected
kentico
- kentico_cms
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')