Description
Umbraco CMS versions prior to 4.7.1 are vulnerable to unauthenticated remote code execution via the codeEditorSave.asmx SOAP endpoint, which exposes a SaveDLRScript operation that permits arbitrary file uploads without authentication. By exploiting a path traversal flaw in the fileName parameter, attackers can write malicious ASPX scripts directly into the web-accessible /umbraco/ directory and execute them remotely.
Problem types
CWE-434 Unrestricted Upload of File with Dangerous Type
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
* before 4.7.1
Credits
Toby Clarke
References
raw.githubusercontent.com/...ows/http/umbraco_upload_aspx.rb
www.exploit-db.com/exploits/19671
web.archive.org/...a-webmatrix-local-reference-instance.html
github.com/umbraco/Umbraco-CMS
web.archive.org/.../umbraco.codeplex.com/releases/view/73692
www.vulncheck.com/advisories/umbraco-cms-rce