Adobe RoboHelp Server Arbitrary File Upload and Execute VulnerabilityZDI-09-066: September 23rd, 2009
TippingPoint™ IPS Customer ProtectionTippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 8527. For further product information on the TippingPoint IPS:
This vulnerability allows remote attackers to execute arbitrary code on vulnerability installations of Adobe RoboHelp Server. Authentication is not required to exploit this vulnerability.
The specific flaw exists in the management web server listening by default on port 8080. The Java Servlet handling POST requests to the server does not properly sanitize user input. A specially crafted request can bypass authentication allowing an attacker to upload and execute arbitrary files. Successful exploitation can result in complete system compromise under SYSTEM credentials.
Vendor ResponseAdobe has issued an update to correct this vulnerability. More details can be found at:
2009-06-26 - Vulnerability reported to vendor
2009-09-23 - Coordinated public release of advisory
CreditThis vulnerability was discovered by:
Stephen Fewer of Harmony Security (www.harmonysecurity.com)