CVE-2017-9822

HIGH KEV RANSOMWARE NUCLEI

DNN <9.1.1 - RCE

Title source: llm

Description

DNN (aka DotNetNuke) before 9.1.1 has Remote Code Execution via a cookie, aka "2017-08 (Critical) Possible remote code execution on DNN sites."

Exploits (5)

nomisec WORKING POC 20 stars
by murataydemir · remote
https://github.com/murataydemir/CVE-2017-9822
nomisec WRITEUP
by Tnot123 · remote
https://github.com/Tnot123/cve-2017-9822
nomisec WRITEUP
by tranphuc2005 · remote-auth
https://github.com/tranphuc2005/CVE-2017-9822
metasploit WORKING POC EXCELLENT
by Jon Park, Jon Seigel · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/dnn_cookie_deserialization_rce.rb
exploitdb WORKING POC
rubyremotewindows
https://www.exploit-db.com/exploits/48336

Nuclei Templates (1)

DotNetNuke 5.0.0 - 9.3.0 - Cookie Deserialization Remote Code Execution
HIGHby milo2012
FOFA: app="dotnetnuke"

Scores

CVSS v3 8.8
EPSS 0.9429
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2021-11-03
VulnCheck KEV 2021-01-21
InTheWild.io 2021-07-23
ENISA EUVD EUVD-2018-0710
Ransomware Use Confirmed
CWE
CWE-94
Status published
Products (3)
dnnsoftware/dotnetnuke < 9.1.1
DotNetNuke/DotNetNuke CMS Fixed in 9.1.1 DotNetNuke CMS Fixed in 9.1.1
nuget/DotNetNuke.Core 0 - 9.1.1NuGet
Published Jul 20, 2017
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026