{"vuid":"VU#168699","idnumber":"168699","name":"dotCMS contains multiple vulnerabilities","keywords":["csrf","path traversal","file upload","CWE-352","CWE-22","CWE-434"],"overview":"The dotCMS administration panel is vulnerable to cross-site request forgery, and the \"Push Publishing\" feature in Enterprise Pro is vulnerable to path traversal and arbitrary file upload. dotCMS versions 3.7.1 and earlier are affected.","clean_desc":"CWE-352: Cross-Site Request Forgery (CSRF) - CVE-2017-3187 \nThe dotCMS administrator panel contains a cross-site request forgery (CSRF) vulnerability. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request. CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') - CVE-2017-3188 \nWhen \"Bundle\" tar.gz archives uploaded to the Push Publishing feature are decompressed, the filenames of its contents are not properly checked, allowing for writing files to arbitrary directories on the file system. These archives may be uploaded directly via the administrator panel, or using the CSRF vulnerability (CVE-2017-3187) described above. CWE-434: Unrestricted Upload of File with Dangerous Type - CVE-2017-3189\nWhen \"Bundle\" tar.gz archives uploaded to the Push Publishing feature are decompressed, there are no checks on the types of files which the bundle contains. This vulnerability combined with the path traversal vulnerability above (CVE-2017-3188) can lead to remote command execution with the permissions of the user running the dotCMS application.","impact":"An unauthenticated remote attacker may perform actions with the dotCMS administrator panel with the same permissions of a victim user or execute arbitrary system commands with the permissions of the user running the dotCMS application.","resolution":"The CERT/CC is currently unaware of a practical solution to this problem.","workarounds":"Do not browse to untrusted sites\nAdministrators can mitigate CSRF vulnerabilities in browser based tools by not browsing to untrusted websites while logged into their account.","sysaffected":"","thanks":"Thanks to: [1] SafeDog Penetration and Defense Lab:darong tong\n[2]SafeDog Penetration and Defense Lab:yong cai\n[3]shaohong wu for reporting these vulnerabilities.","author":"This document was written by Trent Novelly.","public":["http://dotcms.com/","https://cwe.mitre.org/data/definitions/352.html","https://cwe.mitre.org/data/definitions/22.html","https://cwe.mitre.org/data/definitions/434.html"],"cveids":["CVE-2017-3187","CVE-2017-3188","CVE-2017-3189"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2017-01-04T19:03:07Z","publicdate":"2017-03-06T00:00:00Z","datefirstpublished":"2017-03-06T22:10:41Z","dateupdated":"2017-03-07T14:33:23Z","revision":16,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"U","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"6.8","cvss_basevector":"AV:N/AC:M/Au:N/C:P/I:P/A:P","cvss_temporalscore":"6.1","cvss_environmentalscore":"4.60507672760625","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}