Total
50 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-3042 | 1 Dotcms | 1 Dotcms | 2024-09-30 | N/A | 6.1 MEDIUM |
In dotCMS, versions mentioned, a flaw in the NormalizationFilter does not strip double slashes (//) from URLs, potentially enabling bypasses for XSS and access controls. An example affected URL is https://demo.dotcms.com//html/portlet/ext/files/edit_text_inc.jsp , which should return a 404 response but didn't. The oversight in the default invalid URL character list can be viewed at the provided GitHub link https://github.com/dotCMS/core/blob/master/dotCMS/src/main/java/com/dotcms/filters/NormalizationFilter.java#L37 . To mitigate, users can block URLs with double slashes at firewalls or utilize dotCMS config variables. Specifically, they can use the DOT_URI_NORMALIZATION_FORBIDDEN_STRINGS environmental variable to add // to the list of invalid strings. Additionally, the DOT_URI_NORMALIZATION_FORBIDDEN_REGEX variable offers more detailed control, for instance, to block //html.* URLs. Fix Version:23.06+, LTS 22.03.7+, LTS 23.01.4+ | |||||
CVE-2024-3938 | 1 Dotcms | 1 Dotcms | 2024-08-13 | N/A | 6.1 MEDIUM |
The "reset password" login page accepted an HTML injection via URL parameters. This has already been rectified via patch, and as such it cannot be demonstrated via Demo site link. Those interested to see the vulnerability may spin up a http://localhost:8082/dotAdmin/#/public/login?resetEmailSent=true&resetEmail=%3Ch1%3E%3Ca%20href%3D%22https:%2F%2Fgoogle.com%22%3ECLICK%20ME%3C%2Fa%3E%3C%2Fh1%3E This will result in a view along these lines: * OWASP Top 10 - A03: Injection * CVSS Score: 5.4 * AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator * https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&... https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator | |||||
CVE-2022-37431 | 1 Dotcms | 1 Dotcms | 2024-08-03 | N/A | 6.1 MEDIUM |
** DISPUTED ** A Reflected Cross-site scripting (XSS) issue was discovered in dotCMS Core through 22.06. This occurs in the admin portal when the configuration has XSS_PROTECTION_ENABLED=false. NOTE: the vendor disputes this because the current product behavior, in effect, has XSS_PROTECTION_ENABLED=true in all configurations. | |||||
CVE-2022-45782 | 1 Dotcms | 1 Dotcms | 2024-02-04 | N/A | 8.8 HIGH |
An issue was discovered in dotCMS core 5.3.8.5 through 5.3.8.15 and 21.03 through 22.10.1. A cryptographically insecure random generation algorithm for password-reset token generation leads to account takeover. | |||||
CVE-2022-26352 | 1 Dotcms | 1 Dotcms | 2024-02-04 | 6.8 MEDIUM | 9.8 CRITICAL |
An issue was discovered in the ContentResource API in dotCMS 3.0 through 22.02. Attackers can craft a multipart form request to post a file whose filename is not initially sanitized. This allows directory traversal, in which the file is saved outside of the intended storage location. If anonymous content creation is enabled, this allows an unauthenticated attacker to upload an executable file, such as a .jsp file, that can lead to remote code execution. | |||||
CVE-2020-19138 | 1 Dotcms | 1 Dotcms | 2024-02-04 | 10.0 HIGH | 9.8 CRITICAL |
Unrestricted Upload of File with Dangerous Type in DotCMS v5.2.3 and earlier allow remote attackers to execute arbitrary code via the component "/src/main/java/com/dotmarketing/filters/CMSFilter.java". | |||||
CVE-2020-18875 | 1 Dotcms | 1 Dotcms | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
Incorrect Access Control in DotCMS versions before 5.1 allows remote attackers to gain privileges by injecting client configurations via vtl (velocity) files. | |||||
CVE-2021-35361 | 1 Dotcms | 1 Dotcms | 2024-02-04 | 3.5 LOW | 4.8 MEDIUM |
A reflected cross site scripting (XSS) vulnerability in dotAdmin/#/c/links of dotCMS 21.05.1 allows attackers to execute arbitrary commands or HTML via a crafted payload. | |||||
CVE-2020-17542 | 1 Dotcms | 1 Dotcms | 2024-02-04 | 3.5 LOW | 5.4 MEDIUM |
Cross Site Scripting (XSS) in dotCMS v5.1.5 allows remote attackers to execute arbitrary code by injecting a malicious payload into the "Task Detail" comment window of the "/dotAdmin/#/c/workflow" component. | |||||
CVE-2021-35358 | 1 Dotcms | 1 Dotcms | 2024-02-04 | 3.5 LOW | 4.8 MEDIUM |
A stored cross site scripting (XSS) vulnerability in dotAdmin/#/c/c_Images of dotCMS 21.05.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the 'Title' and 'Filename' parameters. | |||||
CVE-2021-35360 | 1 Dotcms | 1 Dotcms | 2024-02-04 | 3.5 LOW | 4.8 MEDIUM |
A reflected cross site scripting (XSS) vulnerability in dotAdmin/#/c/containers of dotCMS 21.05.1 allows attackers to execute arbitrary commands or HTML via a crafted payload. | |||||
CVE-2020-27848 | 1 Dotcms | 1 Dotcms | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
dotCMS before 20.10.1 allows SQL injection, as demonstrated by the /api/v1/containers orderby parameter. The PaginatorOrdered classes that are used to paginate results of a REST endpoints do not sanitize the orderBy parameter and in some cases it is vulnerable to SQL injection attacks. A user must be an authenticated manager in the dotCMS system to exploit this vulnerability. | |||||
CVE-2020-35274 | 1 Dotcms | 1 Dotcms | 2024-02-04 | 3.5 LOW | 4.8 MEDIUM |
DotCMS Add Template with admin panel 20.11 is affected by cross-site Scripting (XSS) to gain remote privileges. An attacker could compromise the security of a website or web application through a stored XSS attack and stealing cookies using XSS. | |||||
CVE-2020-6754 | 1 Dotcms | 1 Dotcms | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
dotCMS before 5.2.4 is vulnerable to directory traversal, leading to incorrect access control. It allows an attacker to read or execute files under $TOMCAT_HOME/webapps/ROOT/assets (which should be a protected directory). Additionally, attackers can upload temporary files (e.g., .jsp files) into /webapps/ROOT/assets/tmp_upload, which can lead to remote command execution (with the permissions of the user running the dotCMS application). | |||||
CVE-2018-17422 | 1 Dotcms | 1 Dotcms | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
dotCMS before 5.0.2 has open redirects via the html/common/forward_js.jsp FORWARD_URL parameter or the html/portlet/ext/common/page_preview_popup.jsp hostname parameter. | |||||
CVE-2019-12309 | 1 Dotcms | 1 Dotcms | 2024-02-04 | 4.0 MEDIUM | 4.9 MEDIUM |
dotCMS before 5.1.0 has a path traversal vulnerability exploitable by an administrator to create files. The vulnerability is caused by the insecure extraction of a ZIP archive. | |||||
CVE-2019-11846 | 1 Dotcms | 1 Dotcms | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
/servlets/ajax_file_upload?fieldName=binary3 in dotCMS 5.1.1 allows XSS and HTML Injection. | |||||
CVE-2019-12872 | 1 Dotcms | 1 Dotcms | 2024-02-04 | 6.5 MEDIUM | 7.2 HIGH |
dotCMS before 5.1.6 is vulnerable to a SQL injection that can be exploited by an attacker of the role Publisher via view_unpushed_bundles.jsp. | |||||
CVE-2018-19554 | 1 Dotcms | 1 Dotcms | 2024-02-04 | 3.5 LOW | 5.4 MEDIUM |
An issue was discovered in Dotcms through 5.0.3. Attackers may perform XSS attacks via the inode, identifier, or fieldName parameter in html/js/dotcms/dijit/image/image_tool.jsp. | |||||
CVE-2017-3189 | 1 Dotcms | 1 Dotcms | 2024-02-04 | 9.3 HIGH | 8.1 HIGH |
The dotCMS administration panel, versions 3.7.1 and earlier, "Push Publishing" feature in Enterprise Pro is vulnerable to arbitrary file upload. When "Bundle" tar.gz archives uploaded to the Push Publishing feature are decompressed, there are no checks on the types of files which the bundle contains. This vulnerability combined with the path traversal vulnerability (CVE-2017-3188) can lead to remote command execution with the permissions of the user running the dotCMS application. An unauthenticated remote attacker may perform actions with the dotCMS administrator panel with the same permissions of a victim user or execute arbitrary system commands with the permissions of the user running the dotCMS application. |