dotCMS 'id' Parameter Multiple Local File Include Vulnerabilities
BID:30703
Info
dotCMS 'id' Parameter Multiple Local File Include Vulnerabilities
| Bugtraq ID: | 30703 |
| Class: | Input Validation Error |
| CVE: |
CVE-2008-3708 |
| Remote: | Yes |
| Local: | No |
| Published: | Aug 15 2008 12:00AM |
| Updated: | Apr 16 2015 05:55PM |
| Credit: | Don of h4cky0u.org |
| Vulnerable: |
dotCMS dotCMS 1.6 |
| Not Vulnerable: | |
Discussion
dotCMS 'id' Parameter Multiple Local File Include Vulnerabilities
dotCMS is prone to multiple local file-include vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker can exploit this vulnerability using directory-traversal strings to view local files within the context of the webserver process. Information harvested may aid in further attacks.
dotCMS 1.6 is vulnerable; other versions may also be affected.
dotCMS is prone to multiple local file-include vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker can exploit this vulnerability using directory-traversal strings to view local files within the context of the webserver process. Information harvested may aid in further attacks.
dotCMS 1.6 is vulnerable; other versions may also be affected.
Exploit / POC
dotCMS 'id' Parameter Multiple Local File Include Vulnerabilities
Attackers can exploit these issues via a browser.
The following example URIs are available:
http://www.example.com/news/index.dot?id=../../../../../../../../etc/passwd%00.jpg
http://www.example.com/getting_started/macros/macros_detail.dot?id=../../../../../../../../etc/passwd%00.html
Attackers can exploit these issues via a browser.
The following example URIs are available:
http://www.example.com/news/index.dot?id=../../../../../../../../etc/passwd%00.jpg
http://www.example.com/getting_started/macros/macros_detail.dot?id=../../../../../../../../etc/passwd%00.html
Solution / Fix
dotCMS 'id' Parameter Multiple Local File Include Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
dotCMS 'id' Parameter Multiple Local File Include Vulnerabilities
References:
References:
- dotCMS Homepage (dotCMS)