Advisory Details

September 23rd, 2009

Adobe RoboHelp Server Arbitrary File Upload and Execute Vulnerability

ZDI-09-066
ZDI-CAN-504

CVE ID CVE-2009-3068
CVSS SCORE
AFFECTED VENDORS Adobe
AFFECTED PRODUCTS RoboHelp Server
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['8527']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerability installations of Adobe RoboHelp Server. Authentication is not required to exploit this vulnerability.

The specific flaw exists in the management web server listening by default on port 8080. The Java Servlet handling POST requests to the server does not properly sanitize user input. A specially crafted request can bypass authentication allowing an attacker to upload and execute arbitrary files. Successful exploitation can result in complete system compromise under SYSTEM credentials.

ADDITIONAL DETAILS Adobe has issued an update to correct this vulnerability. More details can be found at:
http://www.adobe.com/support/security/bulletins/apsb09-14.html
DISCLOSURE TIMELINE
  • 2009-06-26 - Vulnerability reported to vendor
  • 2009-09-23 - Coordinated public release of advisory
CREDIT Stephen Fewer of Harmony Security (www.harmonysecurity.com)
BACK TO ADVISORIES