You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: documentation/modules/exploit/windows/http/sitecore_xp_cve_2025_34510.md
+13-3Lines changed: 13 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,16 @@
1
1
## Vulnerable Application
2
2
3
-
The Sitecore Experience Platform (XP) is flagship CMS product. Provides comprehensive digital marketing tools, view of customer data and many other features. Sitecore deploys multiple default service accounts when installing, among them ServicesAPI. The versions from 10 to 10.4 have hardcoded password for this account - the password is letter b (CVE-2025-34509). This account is used to gain access and exploit additional vulnerability - path traversal in zip extraction (CVE-2025-34510). This module exploits both vulnerabilities to gain remote code execution by uploading malicious ASPX into root directory of webserver.
3
+
The Sitecore Experience Platform (XP) is flagship CMS product.
4
+
Provides comprehensive digital marketing tools, view of customer data and many other features.
5
+
Sitecore deploys multiple default service accounts when installing, among them ServicesAPI.
6
+
The versions from 10 to 10.4 have hardcoded password for this account - the password is letter b (CVE-2025-34509).
7
+
This account is used to gain access and exploit additional vulnerability - path traversal in zip extraction (CVE-2025-34510).
8
+
This module exploits both vulnerabilities to gain remote code execution by uploading malicious ASPX into root directory of webserver.
4
9
5
10
### Installation
6
11
7
-
The Sitecore XP can be downloaded from [here](https://developers.sitecore.com/downloads/Sitecore_Experience_Platform). Please note that a license is required for successful installation.
12
+
The Sitecore XP can be downloaded from [here](https://developers.sitecore.com/downloads/Sitecore_Experience_Platform).
13
+
Please note that a license is required for successful installation.
8
14
9
15
10
16
## Verification Steps
@@ -23,16 +29,20 @@ The Sitecore XP can be downloaded from [here](https://developers.sitecore.com/do
23
29
24
30
### VHOST
25
31
26
-
The hostname of Sitecore XP - when installed, Sitecore XP deploys multiple vhosts, among them is the Sitecore XP host, where a user can access majority of functions.
32
+
The hostname of Sitecore XP.
33
+
When installed, Sitecore XP deploys multiple vhosts, among them is the Sitecore XP host, where a user can access majority of functions.
27
34
28
35
29
36
### IDENTITY_VHOST
30
37
31
38
The Sitecore XP uses separate vhost for "identity host", which is used when user is authenticating and asking for session data.
39
+
If you are not sure about `IDENTITY_VHOST`, you can visit `https://[sitecore instance]/identity/login/shell/SitecoreIdentityServer`.
40
+
The hostname of page where the URL will redirect you can be used as `IDENTITY_VHOST`.
32
41
33
42
## Scenarios
34
43
35
44
```
45
+
msf exploit(windows/http/sitecore_xp_cve_2025_34510) > set IDENTITY_VHOST sitecorepocidentityserver.dev.local
36
46
msf exploit(windows/http/sitecore_xp_cve_2025_34510) > run verbose=true
37
47
[*] Started reverse TCP handler on 192.168.3.7:4444
38
48
[*] Running automatic check ("set AutoCheck false" to disable)
Copy file name to clipboardExpand all lines: documentation/modules/exploit/windows/http/sitecore_xp_cve_2025_34511.md
+13-3Lines changed: 13 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,17 @@
1
1
## Vulnerable Application
2
2
3
-
The Sitecore Experience Platform (XP) is flagship CMS product. Provides comprehensive digital marketing tools, view of customer data and many other features. A user can install multiple extensions to Sitecore XP - among them is Sitecore PowerShell Extension (SPA). It is obligatory requirement for popular SXA add-on. The SPA is vulnerable to unrestricted file upload up to version 7.0. An attacker can upload malicious ASPX file and gain remote code execution.
3
+
The Sitecore Experience Platform (XP) is flagship CMS product.
4
+
Provides comprehensive digital marketing tools, view of customer data and many other features.
5
+
A user can install multiple extensions to Sitecore XP - among them is Sitecore PowerShell Extension (SPA).
6
+
It is obligatory requirement for popular SXA add-on.
7
+
The SPA is vulnerable to unrestricted file upload up to version 7.0.
8
+
An attacker can upload malicious ASPX file and gain remote code execution.
4
9
5
10
6
11
### Installation
7
12
8
-
The Sitecore XP can be downloaded from [here](https://developers.sitecore.com/downloads/Sitecore_Experience_Platform). Please note that a license is required for successful installation.
13
+
The Sitecore XP can be downloaded from [here](https://developers.sitecore.com/downloads/Sitecore_Experience_Platform).
14
+
Please note that a license is required for successful installation.
9
15
10
16
11
17
## Verification Steps
@@ -24,18 +30,22 @@ The Sitecore XP can be downloaded from [here](https://developers.sitecore.com/do
24
30
25
31
### VHOST
26
32
27
-
The hostname of Sitecore XP - when installed, Sitecore XP deploys multiple vhosts, among them is the Sitecore XP host, where a user can access majority of functions.
33
+
The hostname of Sitecore XP.
34
+
When installed, Sitecore XP deploys multiple vhosts, among them is the Sitecore XP host, where a user can access majority of functions.
28
35
29
36
30
37
### IDENTITY_VHOST
31
38
32
39
The Sitecore XP uses separate vhost for "identity host", which is used when user is authenticating and asking for session data.
40
+
If you are not sure about `IDENTITY_VHOST`, you can visit `https://[sitecore instance]/identity/login/shell/SitecoreIdentityServer`.
41
+
The hostname of page where the URL will redirect you can be used as `IDENTITY_VHOST`.
33
42
34
43
35
44
## Scenarios
36
45
37
46
38
47
```
48
+
msf exploit(windows/http/sitecore_xp_cve_2025_34511) > set IDENTITY_VHOST sitecorepocidentityserver.dev.local
39
49
msf exploit(windows/http/sitecore_xp_cve_2025_34511) > set RHOSTS 10.5.132.138
40
50
RHOSTS => 10.5.132.138
41
51
msf exploit(windows/http/sitecore_xp_cve_2025_34511) > set VHOST sitecorepocsc.dev.local
0 commit comments