Vulnerability Description
DNN (aka DotNetNuke) before 9.1.1 has Remote Code Execution via a cookie, aka "2017-08 (Critical) Possible remote code execution on DNN sites."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dnnsoftware | Dotnetnuke | < 9.1.1 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-ReExploitThird Party AdvisoryVDB Entry
- http://www.dnnsoftware.com/community/security/security-centerProductVendor Advisory
- http://www.securityfocus.com/bid/102213Broken LinkThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-ReExploitThird Party AdvisoryVDB Entry
- http://www.dnnsoftware.com/community/security/security-centerProductVendor Advisory
- http://www.securityfocus.com/bid/102213Broken LinkThird Party AdvisoryVDB Entry
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-US Government Resource
FAQ
What is CVE-2017-9822?
CVE-2017-9822 is a vulnerability with a CVSS score of 8.8 (HIGH). DNN (aka DotNetNuke) before 9.1.1 has Remote Code Execution via a cookie, aka "2017-08 (Critical) Possible remote code execution on DNN sites."
How severe is CVE-2017-9822?
CVE-2017-9822 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-9822?
Check the references section above for vendor advisories and patch information. Affected products include: Dnnsoftware Dotnetnuke.