{"vuid":"VU#706695","idnumber":"706695","name":"Checkbox Survey insecurely deserializes ASP.NET View State data","keywords":null,"overview":"### Overview\r\n\r\nCheckbox Survey prior to version 7.0 insecurely deserializes ASP.NET [View State](https://docs.microsoft.com/en-us/previous-versions/aspnet/bb386448(v=vs.100)) data, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable server.\r\n\r\n### Description\r\n\r\n**CVE-2021-27852**\r\nCheckbox Survey insecurely deserializes ASP.NET View State data.\r\n\r\n[Checkbox Survey](https://www.checkbox.com/) is an ASP.NET application that can add survey functionality to a website. Prior to version 7.0, Checkbox Survey implements its own View State functionality by accepting a `_VSTATE` argument, which it then deserializes using [LosFormatter](https://docs.microsoft.com/en-us/dotnet/api/system.web.ui.losformatter?view=netframework-4.8). Because this data is manually handled by the Checkbox Survey code, the ASP.NET ViewState Message Authentication Code (MAC) setting on the server is ignored. Without MAC, an attacker can create arbitrary data that will be deserialized, resulting in arbitrary code execution.\r\n\r\nThis vulnerability is reportedly being exploited in the wild.\r\n\r\n### Impact\r\nBy making a specially-crafted request to a server that uses Checkbox Survey 6.x or earlier, a remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the web server.\r\n\r\n### Solution\r\n#### Apply an update\r\nStarting with Checkbox Survey 7.0, View State data is not used. Therefore, Checkbox Survey versions 7.0 and later do not contain this vulnerability.\r\n\r\n#### Remove Checkbox Survey versions older than 7\r\nCheckbox is no longer developing Checkbox Survey version 6, so this version is no longer safe to use. If you are unable to update to an unaffected version of Checkbox Survey, this software should be removed from any systems that have it installed.\r\n\r\n### Acknowledgements\r\nThanks to the reporter who wishes to remain anonymous.\r\n\r\nThis document was written by Will Dormann.","clean_desc":null,"impact":null,"resolution":null,"workarounds":null,"sysaffected":null,"thanks":null,"author":null,"public":["https://www.checkbox.com/","https://docs.microsoft.com/en-us/previous-versions/aspnet/bb386448(v=vs.100)","https://docs.microsoft.com/en-us/dotnet/api/system.web.ui.losformatter?view=netframework-4.8","https://swapneildash.medium.com/deep-dive-into-net-viewstate-deserialization-and-its-exploitation-54bf5b788817"],"cveids":["CVE-2021-27852"],"certadvisory":null,"uscerttechnicalalert":null,"datecreated":"2021-05-25T20:33:29.445084Z","publicdate":"2021-05-25T20:33:29.250016Z","datefirstpublished":"2021-05-25T20:33:29.464576Z","dateupdated":"2021-05-25T20:33:29.250008Z","revision":1,"vrda_d1_directreport":null,"vrda_d1_population":null,"vrda_d1_impact":null,"cam_widelyknown":null,"cam_exploitation":null,"cam_internetinfrastructure":null,"cam_population":null,"cam_impact":null,"cam_easeofexploitation":null,"cam_attackeraccessrequired":null,"cam_scorecurrent":null,"cam_scorecurrentwidelyknown":null,"cam_scorecurrentwidelyknownexploited":null,"ipprotocol":null,"cvss_accessvector":null,"cvss_accesscomplexity":null,"cvss_authentication":null,"cvss_confidentialityimpact":null,"cvss_integrityimpact":null,"cvss_availabilityimpact":null,"cvss_exploitablity":null,"cvss_remediationlevel":null,"cvss_reportconfidence":null,"cvss_collateraldamagepotential":null,"cvss_targetdistribution":null,"cvss_securityrequirementscr":null,"cvss_securityrequirementsir":null,"cvss_securityrequirementsar":null,"cvss_basescore":null,"cvss_basevector":null,"cvss_temporalscore":null,"cvss_environmentalscore":null,"cvss_environmentalvector":null,"metric":null,"vulnote":46}