Jeff Cochran wrote:
Rick Hein wrote:
This raises a question for me, Do I have DNN configured correctly, or did I misunderstand the documentation?
A bit of both. First, only those authorized to upload files can do this. And frankly, if they can upload files, they don't need to go to this effort to have a malicious script appear, they can just upload it. And second, DNN is ASP.NET. Why would you have ASP Classic enabled on the server when you aren't using it?
There are a ton of ways to secure against this, most of which are done in IIS 6 by default, so you need to actively enable this ability on a server to begin with. It's kind of hard for me to classify anything as a security vulnerability when the admin has to enable it. The real security vulnerability is the admin, who could just as easily set a blank administrator password to allow security vulnerabilities.
I am the admin for an instance of DNN that hosts nearly 300 websites. Now granted not ALL of them are currently active, but a great many are. Almost all of those sites have admins who have the ability to create users for their own sites, and give them login rights, etc. I have no way to know who all those users are, nor do I have time. Not only that, there have been numerous instances of "Authorized" users doing things they shouldn't be (insider credit card theft anyone?) . Yes they are allowed to upload files, however we have NOT given them permission to upload files that are any type of script file. .asp, .aspx, .js, etc, so explain to me how you think they are able to upload malicous scripts that can compromise the server? This is NOT a sarcastic question, even thought it may appear to be. I can't frankly see how anybody can upload a script to my server without using this exploit, maybe you have some insight that I'm not seeing.
The argument that "DNN is ASP.NET, why do you have ASP turned on" is pretty weak as well. Various businesses have different requirements, so to make a blanket statement like that isn't helpful to the discussion. What about those hosting companies that host multiple sites on shared servers? Are all the sites running .NET apps?
My point remains: This is a SIMPLE exploit. I'm sure more than a few people have webservers with DNN on them that are vulnerable.