CVE-2018-15811

HIGH KEV NUCLEI

Dnnsoftware Dotnetnuke < 9.2.1 - Weak Encryption

Title source: rule

Description

DNN (aka DotNetNuke) 9.2 through 9.2.1 uses a weak encryption algorithm to protect input parameters.

Exploits (2)

metasploit WORKING POC EXCELLENT
by Jon Park, Jon Seigel · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/dnn_cookie_deserialization_rce.rb
exploitdb WORKING POC
rubyremotewindows
https://www.exploit-db.com/exploits/48336

Nuclei Templates (1)

DotNetNuke 9.2 - 9.2.1 - Weak Encryption & Cookie Deserialization
HIGHVERIFIEDby pdteam
FOFA: app="dotnetnuke"

Scores

CVSS v3 7.5
EPSS 0.9300
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

CISA KEV 2021-11-03
VulnCheck KEV 2021-11-03
InTheWild.io 2021-07-23
ENISA EUVD EUVD-2019-0590
CWE
CWE-326
Status published
Products (2)
dnnsoftware/dotnetnuke 9.2 - 9.2.1
nuget/DotNetNuke.Core 9.2.0 - 9.2.2NuGet
Published Jul 03, 2019
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026