Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:DIR:CTS-DOTCMS-FILTER-DTRV

Severity

Major

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

dotCMS CMSFilter assets Access Control Weakness

Release Date

2020/04/14

Update Number

3271

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: dotCMS CMSFilter assets Access Control Weakness


This signature detects attempts to exploit a known vulnerability against dotCMS content management system. A successful attack can lead to directory traversal and arbitrary code execution.

Extended Description

dotCMS before 5.2.4 is vulnerable to directory traversal, leading to incorrect access control. It allows an attacker to read or execute files under $TOMCAT_HOME/webapps/ROOT/assets (which should be a protected directory). Additionally, attackers can upload temporary files (e.g., .jsp files) into /webapps/ROOT/assets/tmp_upload, which can lead to remote command execution (with the permissions of the user running the dotCMS application).

Affected Products

  • Dotcms dotcms 1.9
  • Dotcms dotcms 1.9.2.1
  • Dotcms dotcms 1.9.5.1
  • Dotcms dotcms 2.0
  • Dotcms dotcms 2.0.1
  • Dotcms dotcms 2.1
  • Dotcms dotcms 2.1.1
  • Dotcms dotcms 2.2
  • Dotcms dotcms 2.2.1
  • Dotcms dotcms 2.3
  • Dotcms dotcms 2.3.1
  • Dotcms dotcms 2.3.2
  • Dotcms dotcms 2.5
  • Dotcms dotcms 2.5.1
  • Dotcms dotcms 2.5.2
  • Dotcms dotcms 2.5.3
  • Dotcms dotcms 2.5.4
  • Dotcms dotcms 3.0
  • Dotcms dotcms 3.0.1
  • Dotcms dotcms 3.1
  • Dotcms dotcms 3.2
  • Dotcms dotcms 3.2.1
  • Dotcms dotcms 3.2.2
  • Dotcms dotcms 3.2.3
  • Dotcms dotcms 3.2.4
  • Dotcms dotcms 3.3
  • Dotcms dotcms 3.3.1
  • Dotcms dotcms 3.3.2
  • Dotcms dotcms 3.5
  • Dotcms dotcms 3.5.1
  • Dotcms dotcms 3.6.0
  • Dotcms dotcms 3.6.1
  • Dotcms dotcms 3.6.2
  • Dotcms dotcms 3.7.0
  • Dotcms dotcms 3.7.1
  • Dotcms dotcms 3.7.2
  • Dotcms dotcms 4.0.0
  • Dotcms dotcms 4.0.1
  • Dotcms dotcms 4.1.0
  • Dotcms dotcms 4.1.1
  • Dotcms dotcms 4.2.0
  • Dotcms dotcms 4.2.1
  • Dotcms dotcms 4.2.2
  • Dotcms dotcms 4.2.3
  • Dotcms dotcms 4.3.0
  • Dotcms dotcms 4.3.1
  • Dotcms dotcms 4.3.2
  • Dotcms dotcms 4.3.3
  • Dotcms dotcms 4.4.1
  • Dotcms dotcms 5.0.0
  • Dotcms dotcms 5.0.1
  • Dotcms dotcms 5.0.2
  • Dotcms dotcms 5.0.3
  • Dotcms dotcms 5.1.0
  • Dotcms dotcms 5.1.1
  • Dotcms dotcms 5.1.5
  • Dotcms dotcms 5.1.6
  • Dotcms dotcms 5.2.0
  • Dotcms dotcms 5.2.1
  • Dotcms dotcms 5.2.2
  • Dotcms dotcms 5.2.3

References

  • CVE: CVE-2020-6754

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out