WatchTowr Labs Blogpost: Recently joined WatchTowr and starting first blogpost about pre-auth RCE chain in "unknown software". Focused on Kentico's Xperience CMS.
- Vulnerable Configuration: Vulnerabilities affect common configurations where Staging Service is enabled with username/password auth (default disabled). Tested on Kentico Xperience 13.0.172 - 13.0.178.
- WT-2025-0006 Authentication Bypass: Kentico's
CMS.Synchronization.WSE3.SyncServer
service with deserialization vulnerability. Bypassed by adding appropriate SOAP header with username and password. Kentico's custom classWebServiceAuthorization
overrides verification, allowing empty password hash. - WT-2025-0007: Post-Auth Remote Code Execution: Leveraged Authentication Bypass to gain full administrative access. Exploited
ProcessSynchronizationTaskData
method to perform various CMS operations and achieve RCE by controllingTaskData
andTaskBinaryData
. - WT-2025-0011: WSE3 Tragedy: Found another authentication bypass in obsolete Microsoft Web Service Enhancement 3.0 library. By not providing
Password
tag,_passwordOption
remainsSendNone
, bypassing validation. Exploitation varies by version. - Detection Artifact Generators: Created tools to check for vulnerabilities without providing full PoCs.
- Summary: Identified two Authentication Bypasses and a Post-Auth RCE in Kentico Xperience CMS. Thanked Kentico team for engagement.
- Timelines: Timelines for each vulnerability discovery, reproduction, CVE reservation, and vendor patch release.
- WatchTowr Platform: Believes in continuous security testing. Delivers Attack Surface Management and Continuous Automated Red Teaming solution. Request a demo at REQUEST A DEMO.
**粗体** _斜体_ [链接](http://example.com) `代码` - 列表 > 引用
。你还可以使用@
来通知其他用户。