hacktricks/network-services-pentesting/pentesting-web/dotnetnuke-dnn.md
Carlos Polop e65a322118 a
2024-02-09 08:15:24 +01:00

3.5 KiB

DotNetNuke (DNN)

Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!

DotNetNuke (DNN)

If you enter as administrator in DNN it's easy to obtain RCE.

RCE

Via SQL

A SQL console is accessible under the Settings page where you can enable xp_cmdshell and run operating system commands.

Use these lines to enable xp_cmdshell:

EXEC sp_configure 'show advanced options', '1'
RECONFIGURE
EXEC sp_configure 'xp_cmdshell', '1' 
RECONFIGURE

And press "Run Script" to run that sQL sentences.

Then, use something like the following to run OS commands:

xp_cmdshell 'whoami'

Via ASP webshell

In Settings -> Security -> More -> More Security Settings you can add new allowed extensions under Allowable File Extensions, and then clicking the Save button.

Add asp or aspx and then in /admin/file-management upload an asp webshell called shell.asp for example.

Then access to /Portals/0/shell.asp to access your webshell.

Privilege Escalation

You can escalate privileges using the Potatoes or PrintSpoofer for example.

Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!