An issue was discovered in Kentico 12.0.x before 12.0.15, 11.0.x before 11.0.48, 10.0.x before 10.0.52, and 9.x versions. Due to a failure to validate security headers, it was possible for a specially crafted request to the staging service to bypass the initial authentication and proceed to deserialize user-controlled .NET object input. This deserialization then led to unauthenticated remote code execution on the server where the Kentico instance was hosted.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/157588/Kentico-CMS-12.0.14-Remote-Command-Execution.html | Exploit Third Party Advisory VDB Entry |
https://devnet.kentico.com/download/hotfixes#securityBugs-v12 | Release Notes Vendor Advisory |
http://packetstormsecurity.com/files/157588/Kentico-CMS-12.0.14-Remote-Command-Execution.html | Exploit Third Party Advisory VDB Entry |
https://devnet.kentico.com/download/hotfixes#securityBugs-v12 | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/157588/Kentico-CMS-12.0.14-Remote-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://devnet.kentico.com/download/hotfixes#securityBugs-v12 - Release Notes, Vendor Advisory |
16 Jul 2024, 17:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/157588/Kentico-CMS-12.0.14-Remote-Command-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://devnet.kentico.com/download/hotfixes#securityBugs-v12 - Release Notes, Vendor Advisory |
Information
Published : 2019-03-26 18:29
Updated : 2024-11-21 04:18
NVD link : CVE-2019-10068
Mitre link : CVE-2019-10068
CVE.ORG link : CVE-2019-10068
JSON object : View
Products Affected
kentico
- kentico
CWE
CWE-502
Deserialization of Untrusted Data