Show filters
102 Total Results
Displaying 21-30 of 102
Sort by:
Attacker Value
Unknown
CVE-2021-37497
Disclosure Date: February 03, 2023 (last updated October 08, 2023)
SQL injection vulnerability in route of PbootCMS 3.0.5 allows remote attackers to run arbitrary SQL commands via crafted GET request.
0
Attacker Value
Unknown
CVE-2022-37034
Disclosure Date: February 01, 2023 (last updated October 08, 2023)
In dotCMS 5.x-22.06, it is possible to call the TempResource multiple times, each time requesting the dotCMS server to download a large file. If done repeatedly, this will result in Tomcat request-thread exhaustion and ultimately a denial of any other requests.
0
Attacker Value
Unknown
CVE-2022-45783
Disclosure Date: February 01, 2023 (last updated October 08, 2023)
An issue was discovered in dotCMS core 4.x through 22.10.2. An authenticated directory traversal vulnerability in the dotCMS API can lead to Remote Code Execution.
0
Attacker Value
Unknown
CVE-2022-45782
Disclosure Date: February 01, 2023 (last updated October 08, 2023)
An issue was discovered in dotCMS core 5.3.8.5 through 5.3.8.15 and 21.03 through 22.10.1. A cryptographically insecure random generation algorithm for password-reset token generation leads to account takeover.
0
Attacker Value
Unknown
CVE-2022-37033
Disclosure Date: February 01, 2023 (last updated October 08, 2023)
In dotCMS 5.x-22.06, TempFileAPI allows a user to create a temporary file based on a passed in URL, while attempting to block any SSRF access to local IP addresses or private subnets. In resolving this URL, the TempFileAPI follows any 302 redirects that the remote URL returns. Because there is no re-validation of the redirect URL, the TempFileAPI can be used to return data from those local/private hosts that should not be accessible remotely.
0
Attacker Value
Unknown
CVE-2022-35740
Disclosure Date: November 10, 2022 (last updated February 24, 2025)
dotCMS before 22.06 allows remote attackers to bypass intended access control and obtain sensitive information by using a semicolon in a URL to introduce a matrix parameter. (This is also fixed in 5.3.8.12, 21.06.9, and 22.03.2 for LTS users.) Some Java application frameworks, including those used by Spring or Tomcat, allow the use of matrix parameters: these are URI parameters separated by semicolons. Through precise semicolon placement in a URI, it is possible to exploit this feature to avoid dotCMS's path-based XSS prevention (such as "require login" filters), and consequently access restricted resources. For example, an attacker could place a semicolon immediately before a / character that separates elements of a filesystem path. This could reveal file content that is ordinarily only visible to signed-in users. This issue can be chained with other exploit code to achieve XSS attacks against dotCMS.
0
Attacker Value
Unknown
CVE-2022-37431
Disclosure Date: August 05, 2022 (last updated February 24, 2025)
A Reflected Cross-site scripting (XSS) issue was discovered in dotCMS Core through 22.06. This occurs in the admin portal when the configuration has XSS_PROTECTION_ENABLED=false. NOTE: the vendor disputes this because the current product behavior, in effect, has XSS_PROTECTION_ENABLED=true in all configurations
0
Attacker Value
Unknown
CVE-2022-32417
Disclosure Date: July 14, 2022 (last updated February 24, 2025)
PbootCMS v3.1.2 was discovered to contain a remote code execution (RCE) vulnerability via the function parserIfLabel at function.php.
0
Attacker Value
Unknown
CVE-2020-20971
Disclosure Date: June 02, 2022 (last updated February 23, 2025)
Cross Site Request Forgery (CSRF) vulnerability in PbootCMS v2.0.3 via /admin.php?p=/User/index.
0
Attacker Value
Unknown
CVE-2020-19138
Disclosure Date: September 08, 2021 (last updated February 23, 2025)
Unrestricted Upload of File with Dangerous Type in DotCMS v5.2.3 and earlier allow remote attackers to execute arbitrary code via the component "/src/main/java/com/dotmarketing/filters/CMSFilter.java".
0