cve-2022-35740
Vulnerability from cvelistv5
Published
2022-11-10 00:00
Modified
2024-08-03 09:44
Severity ?
EPSS score ?
Summary
dotCMS before 22.06 allows remote attackers to bypass intended access control and obtain sensitive information by using a semicolon in a URL to introduce a matrix parameter. (This is also fixed in 5.3.8.12, 21.06.9, and 22.03.2 for LTS users.) Some Java application frameworks, including those used by Spring or Tomcat, allow the use of matrix parameters: these are URI parameters separated by semicolons. Through precise semicolon placement in a URI, it is possible to exploit this feature to avoid dotCMS's path-based XSS prevention (such as "require login" filters), and consequently access restricted resources. For example, an attacker could place a semicolon immediately before a / character that separates elements of a filesystem path. This could reveal file content that is ordinarily only visible to signed-in users. This issue can be chained with other exploit code to achieve XSS attacks against dotCMS.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/dotCMS/patches-hotfixes/tree/master/com.dotcms.security.matrixparams | Exploit, Third Party Advisory | |
cve@mitre.org | https://www.dotcms.com/security/SI-63 | Exploit, Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/dotCMS/patches-hotfixes/tree/master/com.dotcms.security.matrixparams | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.dotcms.com/security/SI-63 | Exploit, Mitigation, Vendor Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:44:21.912Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.dotcms.com/security/SI-63" }, { "tags": [ "x_transferred" ], "url": "https://github.com/dotCMS/patches-hotfixes/tree/master/com.dotcms.security.matrixparams" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "dotCMS before 22.06 allows remote attackers to bypass intended access control and obtain sensitive information by using a semicolon in a URL to introduce a matrix parameter. (This is also fixed in 5.3.8.12, 21.06.9, and 22.03.2 for LTS users.) Some Java application frameworks, including those used by Spring or Tomcat, allow the use of matrix parameters: these are URI parameters separated by semicolons. Through precise semicolon placement in a URI, it is possible to exploit this feature to avoid dotCMS\u0027s path-based XSS prevention (such as \"require login\" filters), and consequently access restricted resources. For example, an attacker could place a semicolon immediately before a / character that separates elements of a filesystem path. This could reveal file content that is ordinarily only visible to signed-in users. This issue can be chained with other exploit code to achieve XSS attacks against dotCMS." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-10T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.dotcms.com/security/SI-63" }, { "url": "https://github.com/dotCMS/patches-hotfixes/tree/master/com.dotcms.security.matrixparams" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-35740", "datePublished": "2022-11-10T00:00:00", "dateReserved": "2022-07-13T00:00:00", "dateUpdated": "2024-08-03T09:44:21.912Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-35740\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-11-10T21:15:10.230\",\"lastModified\":\"2024-11-21T07:11:34.837\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"dotCMS before 22.06 allows remote attackers to bypass intended access control and obtain sensitive information by using a semicolon in a URL to introduce a matrix parameter. (This is also fixed in 5.3.8.12, 21.06.9, and 22.03.2 for LTS users.) Some Java application frameworks, including those used by Spring or Tomcat, allow the use of matrix parameters: these are URI parameters separated by semicolons. Through precise semicolon placement in a URI, it is possible to exploit this feature to avoid dotCMS\u0027s path-based XSS prevention (such as \\\"require login\\\" filters), and consequently access restricted resources. For example, an attacker could place a semicolon immediately before a / character that separates elements of a filesystem path. This could reveal file content that is ordinarily only visible to signed-in users. This issue can be chained with other exploit code to achieve XSS attacks against dotCMS.\"},{\"lang\":\"es\",\"value\":\"dotCMS anterior a 22.06 permite a atacantes remotos omitir el control de acceso previsto y obtener informaci\u00f3n confidencial utilizando un punto y coma en una URL para introducir un par\u00e1metro de matriz. (Esto tambi\u00e9n se corrigi\u00f3 en 5.3.8.12, 21.06.9 y 22.03.2 para usuarios de LTS). Algunos frameworks de aplicaciones Java, incluidos los utilizados por Spring o Tomcat, permiten el uso de par\u00e1metros matriciales: estos son par\u00e1metros URI separados por punto y coma. Mediante la colocaci\u00f3n precisa de punto y coma en un URI, es posible explotar esta caracter\u00edstica para evitar la prevenci\u00f3n XSS basada en rutas de dotCMS (como los filtros \\\"requerir inicio de sesi\u00f3n\\\") y, en consecuencia, acceder a recursos restringidos. Por ejemplo, un atacante podr\u00eda colocar un punto y coma inmediatamente antes del car\u00e1cter / que separa los elementos de una ruta del sistema de archivos. Esto podr\u00eda revelar contenido del archivo que normalmente solo es visible para los usuarios que han iniciado sesi\u00f3n. Este problema se puede encadenar con otro c\u00f3digo de explotaci\u00f3n para lograr ataques XSS contra dotCMS.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dotcms:dotcms:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"5.3.8\",\"versionEndExcluding\":\"5.3.8.12\",\"matchCriteriaId\":\"AF4F4D8E-0270-4FFB-BD5F-B654C4D2E8D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dotcms:dotcms:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"21.06\",\"versionEndExcluding\":\"21.06.9\",\"matchCriteriaId\":\"FC366033-F8CF-4490-9ED5-B61175A05A04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"22.01\",\"versionEndExcluding\":\"22.06\",\"matchCriteriaId\":\"04FF0C01-D5D3-4F4E-90B7-01C2B061D96D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dotcms:dotcms:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"22.03\",\"versionEndExcluding\":\"22.03.2\",\"matchCriteriaId\":\"B1FE64DC-D25A-4C34-B174-0B92225E0851\"}]}]}],\"references\":[{\"url\":\"https://github.com/dotCMS/patches-hotfixes/tree/master/com.dotcms.security.matrixparams\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.dotcms.com/security/SI-63\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/dotCMS/patches-hotfixes/tree/master/com.dotcms.security.matrixparams\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.dotcms.com/security/SI-63\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mitigation\",\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.