Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title dotCMS contains multiple vulnerabilities
Informations
Name VU#168699 First vendor Publication 2017-03-06
Vendor VU-CERT Last vendor Modification 2017-03-07
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#168699

dotCMS contains multiple vulnerabilities

Original Release date: 06 Mar 2017 | Last revised: 07 Mar 2017

Overview

The dotCMS administration panel is vulnerable to cross-site request forgery, and the "Push Publishing" feature in Enterprise Pro is vulnerable to path traversal and arbitrary file upload. dotCMS versions 3.7.1 and earlier are affected.

Description

CWE-352: Cross-Site Request Forgery (CSRF) - CVE-2017-3187

The dotCMS administrator panel contains a cross-site request forgery (CSRF) vulnerability. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request.

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') - CVE-2017-3188
When "Bundle" tar.gz archives uploaded to the Push Publishing feature are decompressed, the filenames of its contents are not properly checked, allowing for writing files to arbitrary directories on the file system. These archives may be uploaded directly via the administrator panel, or using the CSRF vulnerability (CVE-2017-3187) described above.

CWE-434: Unrestricted Upload of File with Dangerous Type - CVE-2017-3189
When "Bundle" tar.gz archives uploaded to the Push Publishing feature are decompressed, there are no checks on the types of files which the bundle contains. This vulnerability combined with the path traversal vulnerability above (CVE-2017-3188) can lead to remote command execution with the permissions of the user running the dotCMS application.

Impact

An unauthenticated remote attacker may perform actions with the dotCMS administrator panel with the same permissions of a victim user or execute arbitrary system commands with the permissions of the user running the dotCMS application.

Solution

The CERT/CC is currently unaware of a practical solution to this problem.

Do not browse to untrusted sites
Administrators can mitigate CSRF vulnerabilities in browser based tools by not browsing to untrusted websites while logged into their account.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
dotCMSAffected19 Jan 201702 Mar 2017
dotCMSUnknown03 Mar 201703 Mar 2017
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base6.8AV:N/AC:M/Au:N/C:P/I:P/A:P
Temporal6.1E:POC/RL:U/RC:C
Environmental4.6CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

  • http://dotcms.com/
  • https://cwe.mitre.org/data/definitions/352.html
  • https://cwe.mitre.org/data/definitions/22.html
  • https://cwe.mitre.org/data/definitions/434.html

Credit

Thanks to:

[1]SafeDog Penetration and Defense Lab:darong tong
[2]SafeDog Penetration and Defense Lab:yong cai
[3]shaohong wu

for reporting these vulnerabilities.

This document was written by Trent Novelly.

Other Information

  • CVE IDs:CVE-2017-3187CVE-2017-3188CVE-2017-3189
  • Date Public:06 Mar 2017
  • Date First Published:06 Mar 2017
  • Date Last Updated:07 Mar 2017
  • Document Revision:15

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/168699

CWE : Common Weakness Enumeration

% Id Name
33 % CWE-434 Unrestricted Upload of File with Dangerous Type (CWE/SANS Top 25)
33 % CWE-352 Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25)
33 % CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 29

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2018-09-25 17:21:34
  • Multiple Updates
2018-09-24 21:23:01
  • Multiple Updates
2018-07-24 21:21:46
  • Multiple Updates
2017-03-07 17:21:53
  • Multiple Updates
2017-03-07 00:23:32
  • First insertion