Based on your detailed breakdown, it appears that you've discovered a critical vulnerability in Progress ShareFile's On-Premise Storage Zone Controller. The issue stems from an improper handling of redirects within the Admin.aspx page, leading to an authentication bypass and potential Remote Code Execution (RCE) via misconfiguration.
Here’s a summary of your findings:
Authentication Bypass
-
Functionality Overview:
- When accessing
/ConfigService/Admin.aspx, the application checks if the session is authenticated. - If not authenticated, it redirects to
/ConfigService/Login.aspx?callerpage=Admin.
- When accessing
-
Code Issue:
- The
RedirectAndCompleteRequestfunction passes afalseflag tohttpContext.Response.Redirect(). - This causes the redirect but does not terminate execution of the current page.
- As a result, unauthenticated users can still access and interact with the admin panel.
- The
-
Impact:
- Unauthenticated users gain full administrative control over the Zone Controller settings.
Exploitation Path
- Joining an Existing Zone:
- You explored the "Join existing Zone" option to test if you could manipulate zone configurations.
Read the full article at watchTowr Labs - Blog
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.

![[AINews] The Unreasonable Effectiveness of Closing the Loop](/_next/image?url=https%3A%2F%2Fmedia.nemati.ai%2Fmedia%2Fblog%2Fimages%2Farticles%2F600e22851bc7453b.webp&w=3840&q=75)



