CVE-2019-10068

An issue was discovered in Kentico 12.0.x before 12.0.15, 11.0.x before 11.0.48, 10.0.x before 10.0.52, and 9.x versions. Due to a failure to validate security headers, it was possible for a specially crafted request to the staging service to bypass the initial authentication and proceed to deserialize user-controlled .NET object input. This deserialization then led to unauthenticated remote code execution on the server where the Kentico instance was hosted.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:kentico:kentico:*:*:*:*:*:*:*:*
cpe:2.3:a:kentico:kentico:*:*:*:*:*:*:*:*
cpe:2.3:a:kentico:kentico:*:*:*:*:*:*:*:*
cpe:2.3:a:kentico:kentico:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:18

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/157588/Kentico-CMS-12.0.14-Remote-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/157588/Kentico-CMS-12.0.14-Remote-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () https://devnet.kentico.com/download/hotfixes#securityBugs-v12 - Release Notes, Vendor Advisory () https://devnet.kentico.com/download/hotfixes#securityBugs-v12 - Release Notes, Vendor Advisory

16 Jul 2024, 17:54

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/157588/Kentico-CMS-12.0.14-Remote-Command-Execution.html - () http://packetstormsecurity.com/files/157588/Kentico-CMS-12.0.14-Remote-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () https://devnet.kentico.com/download/hotfixes#securityBugs-v12 - Product, Vendor Advisory () https://devnet.kentico.com/download/hotfixes#securityBugs-v12 - Release Notes, Vendor Advisory

Information

Published : 2019-03-26 18:29

Updated : 2024-11-21 04:18


NVD link : CVE-2019-10068

Mitre link : CVE-2019-10068

CVE.ORG link : CVE-2019-10068


JSON object : View

Products Affected

kentico

  • kentico
CWE
CWE-502

Deserialization of Untrusted Data