CVE-2022-26352

An issue was discovered in the ContentResource API in dotCMS 3.0 through 22.02. Attackers can craft a multipart form request to post a file whose filename is not initially sanitized. This allows directory traversal, in which the file is saved outside of the intended storage location. If anonymous content creation is enabled, this allows an unauthenticated attacker to upload an executable file, such as a .jsp file, that can lead to remote code execution.
References
Link Resource
http://packetstormsecurity.com/files/167365/dotCMS-Shell-Upload.html Exploit Third Party Advisory VDB Entry
https://groups.google.com/g/dotcms Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:*

History

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-434
CWE-22
NVD-CWE-Other

25 Jul 2022, 22:38

Type Values Removed Values Added
References (MISC) https://groups.google.com/g/dotcms - (MISC) https://groups.google.com/g/dotcms - Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/167365/dotCMS-Shell-Upload.html - (MISC) http://packetstormsecurity.com/files/167365/dotCMS-Shell-Upload.html - Exploit, Third Party Advisory, VDB Entry
CPE cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 9.8
CWE CWE-22
CWE-434

17 Jul 2022, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-07-17 22:15

Updated : 2024-02-04 22:51


NVD link : CVE-2022-26352

Mitre link : CVE-2022-26352

CVE.ORG link : CVE-2022-26352


JSON object : View

Products Affected

dotcms

  • dotcms