Search for hundreds of thousands of exploits

"Sitecore 8.x - Deserialization Remote Code Execution"

Author

Exploit author

"Jarad Kopf"

Platform

Exploit platform

aspx

Release date

Exploit published date

2019-06-13

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
# Exploit Title: Sitecore v 8.x Deserialization RCE
# Date: Reported to vendor October 2018, fix released April 2019.
# Exploit Author: Jarad Kopf
# Vendor Homepage: https://www.sitecore.com/
# Software Link: Sitecore downloads: https://dev.sitecore.net/Downloads.aspx
# Version: Sitecore 8.0 Revision 150802
# Tested on: Windows
# CVE : CVE-2019-11080 

Exploit: 

Authentication is needed for this exploit. An attacker needs to login to Sitecore 8.0 revision 150802's Admin section. 
When choosing to Serializeusers or domains in the admin UI, calls to /sitecore/shell/~/xaml/Sitecore.Shell.Applications.Dialogs.Progress.aspx will include a CSRFTOKEN parameter. 
By replacing this parameter with a URL-encoded, base64-encoded crafted payload from ysoserial.net, an RCE is successful.
Release DateTitleTypePlatformAuthor
2019-08-27"Tableau - XML External Entity"webappsmultiple"Jarad Kopf"
2019-06-13"Sitecore 8.x - Deserialization Remote Code Execution"webappsaspx"Jarad Kopf"
import requests
response = requests.get('https://www.nmmapper.com/api/exploitdetails/46987/?format=json')

For full documentation follow the link above

Cipherscan. A very simple way to find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.