The dotCMS administration panel, versions 3.7.1 and earlier, "Push Publishing" feature in Enterprise Pro is vulnerable to path traversal. When "Bundle" tar.gz archives uploaded to the Push Publishing feature are decompressed, the filenames of its contents are not properly checked, allowing for writing files to arbitrary directories on the file system. These archives may be uploaded directly via the administrator panel, or using the CSRF vulnerability (CVE-2017-3187). An unauthenticated remote attacker may perform actions with the dotCMS administrator panel with the same permissions of a victim user or execute arbitrary system commands with the permissions of the user running the dotCMS application.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/96616 | Third Party Advisory VDB Entry |
https://doc.dotcms.com/security/SI-41 | Vendor Advisory |
https://www.kb.cert.org/vuls/id/168699 | Third Party Advisory US Government Resource |
Configurations
History
No history.
Information
Published : 2018-07-24 15:29
Updated : 2024-02-04 20:03
NVD link : CVE-2017-3188
Mitre link : CVE-2017-3188
CVE.ORG link : CVE-2017-3188
JSON object : View
Products Affected
dotcms
- dotcms
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')