Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-10068

Опубликовано: 26 мар. 2019
Источник: nvd
CVSS3: 9.8
CVSS2: 7.5
EPSS Критический

Описание

An issue was discovered in Kentico 12.0.x before 12.0.15, 11.0.x before 11.0.48, 10.0.x before 10.0.52, and 9.x versions. Due to a failure to validate security headers, it was possible for a specially crafted request to the staging service to bypass the initial authentication and proceed to deserialize user-controlled .NET object input. This deserialization then led to unauthenticated remote code execution on the server where the Kentico instance was hosted.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:kentico:xperience:*:*:*:*:*:*:*:*
Версия от 9.0.0 (включая) до 9.0.51 (включая)
cpe:2.3:a:kentico:xperience:*:*:*:*:*:*:*:*
Версия от 10.0.0 (включая) до 10.0.52 (исключая)
cpe:2.3:a:kentico:xperience:*:*:*:*:*:*:*:*
Версия от 11.0.0 (включая) до 11.0.48 (исключая)
cpe:2.3:a:kentico:xperience:*:*:*:*:*:*:*:*
Версия от 12.0.0 (включая) до 12.0.15 (исключая)

EPSS

Процентиль: 100%
0.93889
Критический

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-502
CWE-502

Связанные уязвимости

CVSS3: 9.8
github
больше 3 лет назад

An issue was discovered in Kentico 12.0.x before 12.0.15, 11.0.x before 11.0.48, 10.0.x before 10.0.52, and 9.x versions. Due to a failure to validate security headers, it was possible for a specially crafted request to the staging service to bypass the initial authentication and proceed to deserialize user-controlled .NET object input. This deserialization then led to unauthenticated remote code execution on the server where the Kentico instance was hosted.

EPSS

Процентиль: 100%
0.93889
Критический

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-502
CWE-502