Remote Code Execution via Insecure Deserialization
Summary
A vulnerability has been found in the MonoX CMS for .NET up to v5.1.40.5152, which allows remote code execution via insecure deserialization. During the review, it was possible to see that the application used serialization to transfer objects over the network. In certain cases, this process could be exploited by an attacker, which could deserialize arbitrary objects, leading to remote code execution. Multiple classes were found to be affected by this issue, such as:
MonoX.MonoSoftware.MonoX.ModuleGallery.HTML5Upload
MonoX.MonoSoftware.MonoX.ModuleGallery.SilverLightUploadModule
MonoX.MonoSoftware.MonoX.HTML5Upload
MonoX.MonoSoftware.MonoX.SilverLightUploadHandler
The exploitable URLs were found to be:
/MonoX/Pages/SocialNetworking/lng/en-US/PhotoGallery.aspx
/MonoX/HTML5Upload.ashx
All the instances showed to be exploitable, leading to arbitrary code execution.
For further information, please refer to the single vulnerabilities.
Remediation
Currently, no fixes are available for the issues.