Discover the critical CVE-2019-10012 affecting Jenzabar JICS (Internet Campus Solution) before version 9, allowing remote attackers to execute .aspx code via a ZIP archive and the MoxieManager plugin.
Jenzabar JICS (Internet Campus Solution) before version 9 is vulnerable to remote code execution via a ZIP archive containing .aspx code and leveraging the MoxieManager plugin.
Understanding CVE-2019-10012
In the Jenzabar JICS system, a critical vulnerability exists that allows attackers to upload and execute malicious .aspx code remotely.
What is CVE-2019-10012?
This CVE refers to a security flaw in Jenzabar JICS, also known as Internet Campus Solution, where versions prior to 9 are susceptible to a remote code execution attack.
The Impact of CVE-2019-10012
The vulnerability enables threat actors to upload and execute .aspx code by embedding it within a ZIP archive, exploiting the MoxieManager plugin (for .NET) in versions earlier than 2.1.4.
Technical Details of CVE-2019-10012
Jenzabar JICS (Internet Campus Solution) before version 9 is affected by this vulnerability.
Vulnerability Description
Attackers can remotely upload and execute arbitrary .aspx code by placing it in a ZIP archive and utilizing the MoxieManager plugin (for .NET) before version 2.1.4.
Affected Systems and Versions
Exploitation Mechanism
The attack is facilitated by including malicious .aspx code within a ZIP archive and leveraging the vulnerable MoxieManager plugin located in the moxiemanager directory within the installation folder ICS\ICS.NET\ICSFileServer.
Mitigation and Prevention
It is crucial to take immediate steps to address and prevent exploitation of this vulnerability.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates