Security News > 2022 > May > Critical RCE Bug Reported in dotCMS Content Management Software

Critical RCE Bug Reported in dotCMS Content Management Software
2022-05-04 05:05

A pre-authenticated remote code execution vulnerability has been disclosed in dotCMS, an open-source content management system written in Java and "Used by over 10,000 clients in over 70 countries around the globe, from Fortune 500 brands and mid-sized businesses."

The critical flaw, tracked as CVE-2022-26352, stems from a directory traversal attack when performing file uploads, enabling an adversary to execute arbitrary commands on the underlying system.

Although the exploit made it possible to write to arbitrary JavaScript files being served by the application, the researchers said the nature of the bug was such that it could be weaponized to gain command execution.

"When files are uploaded into dotCMS via the content API, but before they become content, dotCMS writes the file down in a temp directory," the company said.

"In the case of this vulnerability, dotCMS does not sanitize the filename passed in via the multipart request header and thus does not sanitize the temp file's name."

"In the case of this exploit, an attacker can upload a special.jsp file to the webapp/ROOT directory of dotCMS which can allow for remote code execution," it noted.


News URL

https://thehackernews.com/2022/05/critical-rce-bug-reported-in-dotcms.html

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2022-07-17 CVE-2022-26352 Unspecified vulnerability in Dotcms
An issue was discovered in the ContentResource API in dotCMS 3.0 through 22.02.
network
low complexity
dotcms
critical
9.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Dotcms 1 1 25 18 6 50