CVE-2016-3972

Published on: 04/18/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:02 PM UTC

CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

Certain versions of Dotcms from Dotcms contain the following vulnerability:

Directory traversal vulnerability in the dotTailLogServlet in dotCMS before 3.5.1 allows remote authenticated administrators to read arbitrary files via a .. (dot dot) in the fileName parameter.

  • CVE-2016-3972 has been assigned by [email protected] to track the vulnerability - currently rated as LOW severity.

CVSS3 Score: 2.7 - LOW

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW HIGH NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED LOW NONE NONE

CVSS2 Score: 4 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW SINGLE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL NONE NONE

CVE References

Description Tags Link
Full Disclosure: [CVE-2016-3972]DotCMS Directory traversal vulnerability Exploit
seclists.org
text/html
URL Logo FULLDISC 20160408 [CVE-2016-3972]DotCMS Directory traversal vulnerability
Directory traversal vulnerability by Admin Vendor Advisory
dotcms.com
text/html
URL Logo CONFIRM dotcms.com/security/SI-34

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationDotcmsDotcmsAllAllAllAll
  • cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:*: