Market Cap: $2.7303T -0.020%
Volume(24h): $72.6295B 30.200%
  • Market Cap: $2.7303T -0.020%
  • Volume(24h): $72.6295B 30.200%
  • Fear & Greed Index:
  • Market Cap: $2.7303T -0.020%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top News
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
bitcoin
bitcoin

$83613.281522 USD

-0.31%

ethereum
ethereum

$1907.196020 USD

-0.12%

tether
tether

$0.999991 USD

-0.02%

xrp
xrp

$2.346667 USD

-0.01%

bnb
bnb

$638.706352 USD

6.12%

solana
solana

$128.851013 USD

-3.46%

usd-coin
usd-coin

$1.000040 USD

0.01%

dogecoin
dogecoin

$0.173959 USD

1.06%

cardano
cardano

$0.724425 USD

-0.57%

tron
tron

$0.214243 USD

-1.65%

pi
pi

$1.351541 USD

-9.35%

unus-sed-leo
unus-sed-leo

$9.827847 USD

0.06%

chainlink
chainlink

$13.795794 USD

-1.22%

toncoin
toncoin

$3.420442 USD

0.21%

stellar
stellar

$0.273472 USD

1.29%

Cryptocurrency News Articles

I recently joined watchTowr, and it is, therefore, time - time for my first watchTowr Labs blogpost

Mar 17, 2025 at 08:12 pm

Kentico's Xperience CMS stood out as promising, fulfilling several key criteria: This meets the criteria of something we'd define as “interesting,”

I recently joined watchTowr, and it is, therefore, time - time for my first watchTowr Labs blogpost

Recently joining the watchTowr Labs team, I wanted to maintain the trail of destruction left by the team and so had to get my teeth into things quickly. Two primary goals were clear:

* Continue the legacy of high-quality research into interesting and impactful vulnerabilities.

* Contribute to the broader security community with our findings.

Kentico’s Xperience CMS stood out as promising, fulfilling several key criteria:

* It’s a widely used solution, powering a large portion of the web.

* The Kentico security team has always been responsive and engaged in disclosing vulnerabilities.

* It presented several interesting technical challenges that we enjoyed exploring.

This meets the criteria of something we’d define as “interesting,” so we began. A few hours later, (sigh), we stumbled into our first Authentication Bypass vulnerability. Throughout this research, we identified the following vulnerabilities:

* WT-2025-0006: Authentication Bypass in Kentico Xperience CMS Staging API

* WT-2025-0007: Post-Auth Remote Code Execution in Kentico Xperience CMS Staging API

* WT-2025-0011: Another Authentication Bypass in Kentico Xperience CMS Staging API

As we walk through this analysis, we’ll take you on our journey that allowed us to build exploit chains to achieve Remote Code Execution against (at the time) fully patched Kentico Xperience CMS deployments.

Time to dive in… (and until next time..)

Vulnerable Configuration

Before we even start deep diving into the vulnerabilities, we want to be clear that the vulnerabilities highlighted in this blogpost do not affect every Kentico CMS installation (but do appear to affect common configurations).

For the vulnerabilities we’re about to discuss, two requirements need to be fulfilled:

* The Staging Service must be enabled.

* The authentication type must be set to User name and password.

However, based on our dataset and exposure across the watchTowr client base, we can confidently say that the above requirements appear to be a common configuration - please do not write these weaknesses off as requiring edge cases. Reassuringly, this seriousness and severity was reflected in the vendors response - the Kentico security team treated all vulnerabilities seriously, and we’ll discuss this further later.

Our research, initially, was performed our initial research on Kentico Xperience 13.0.172. We also found a second Authentication Bypass, while reviewing Kentico Xperience 13.0.173. Although we never reviewed version 12 of Kentico Xperience (or below), we have high-confidence data that version 12 is also vulnerable to both WT-2025-0006 Authentication Bypass and WT-2025-0011 Authentication Bypass.

To get your system into a vulnerable position while you follow this post along at home, a Kentico administrative user can enable the Staging Service within the CMS settings functionality, while selecting the User name and password authentication type, as presented in the next screenshot:

With this configuration complete, the next step is to investigate how this authentication is being performed. Let's dive into the technical details!

WT-2025-0006: Authentication Bypass

When we review new solutions, as we’ve described before a basic aim is to understand the exposed attack surface of the solution and quickly get a feel for how it has been architected. In case of web applications, you may want to look for some REST- or SOAP-based APIs. Interestingly, Kentico’s Experience CMS does not expose a significant number of webservices and endpoints, presenting a relatively small attack surface.

However, a service called CMS.Synchronization.WSE3.SyncServer immediately caught our attention. It exposes a single endpoint, and was interesting for two reasons:

* It’s used for synchronization tasks between several Kentico instances.

* It’s part of the internal Kentico API, not something that is designed to be used by third-party services or applications.

Sounds like fun! Let's try to send a simple HTTP request targeting this web method and just see what happens through the power of FAFO:

We’re presented with the following error message:

In the screenshot above presenting the definition of WebService, you may have noticed a mysterious Policy attribute. Its full class name is Microsoft.Web.Services3.PolicyAttribute, and it's implemented in Microsoft.Web.Services3.dll. We've never heard of this DLL before, and so found ourselves scratching our heads a little here.

A quick Google search revealed that this is part of obsolete (probably since 2012) Web Services Enhancement 3.0 for Microsoft .NET. This is likely superseded by .NET WCF, but it'

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on Mar 18, 2025