An issue was discovered in the ContentResource API in dotCMS 3.0 through 22.02. Attackers can craft a multipart form request to post a file whose filename is not initially sanitized. This allows directory traversal, in which the file is saved outside of the intended storage location. If anonymous content creation is enabled, this allows an unauthenticated attacker to upload an executable file, such as a .jsp file, that can lead to remote code execution.
References
Link Resource
http://packetstormsecurity.com/files/167365/dotCMS-Shell-Upload.html Exploit Third Party Advisory VDB Entry
https://groups.google.com/g/dotcms Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2022-07-17T21:54:53

Updated: 2022-07-17T21:54:53

Reserved: 2022-03-02T00:00:00


Link: CVE-2022-26352

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-07-17T22:15:08.787

Modified: 2023-08-08T14:21:49.707


Link: CVE-2022-26352

JSON object: View

cve-icon Redhat Information

No data.