CVE-2017-9822
HIGH KEV RANSOMWARE NUCLEIDNN <9.1.1 - RCE
Title source: llmDescription
DNN (aka DotNetNuke) before 9.1.1 has Remote Code Execution via a cookie, aka "2017-08 (Critical) Possible remote code execution on DNN sites."
Exploits (5)
metasploit
WORKING POC
EXCELLENT
by Jon Park, Jon Seigel · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/dnn_cookie_deserialization_rce.rb
Nuclei Templates (1)
DotNetNuke 5.0.0 - 9.3.0 - Cookie Deserialization Remote Code Execution
HIGHby milo2012
FOFA:
app="dotnetnuke"
References (4)
Scores
CVSS v3
8.8
EPSS
0.9429
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2021-11-03
VulnCheck KEV
2021-01-21
InTheWild.io
2021-07-23
ENISA EUVD
EUVD-2018-0710
Ransomware Use
Confirmed
CWE
CWE-94
Status
published
Products (3)
dnnsoftware/dotnetnuke
< 9.1.1
DotNetNuke/DotNetNuke CMS Fixed in 9.1.1
DotNetNuke CMS Fixed in 9.1.1
nuget/DotNetNuke.Core
0 - 9.1.1NuGet
Published
Jul 20, 2017
KEV Added
Nov 03, 2021
Tracked Since
Feb 18, 2026