Ektron Content Management System (CMS) before 8.02 SP5 uses the XslCompiledTransform class with enablescript set to true, which allows remote attackers to execute arbitrary code with NETWORK SERVICE privileges via crafted XSL data.
Weaknesses in this category are typically found in functionality that processes data. Data processing is the manipulation of input to retrieve or save information.
Link | Tags |
---|---|
https://webstersprodigy.net/2012/10/25/cve-2012-5357cve-1012-5358-cool-ektron-xslt-rce-bugs/ | issue tracking exploit third party advisory |
https://www.rapid7.com/db/modules/exploit/windows/http/ektron_xslt_exec | issue tracking exploit third party advisory |
http://documentation.ektron.com/current/ReleaseNotes/Release8/8.02SP5.htm | issue tracking vendor advisory |
https://technet.microsoft.com/library/security/msvr12-016 | issue tracking release notes third party advisory |