SQL injection vulnerability in the REST API in dotCMS before 3.3.2 allows remote attackers to execute arbitrary SQL commands via the stName parameter to api/content/save/1.
References
Link | Resource |
---|---|
http://dotcms.com/security/SI-35 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/94992 | |
https://github.com/dotCMS/core/issues/8848 | Issue Tracking Patch |
http://dotcms.com/security/SI-35 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/94992 | |
https://github.com/dotCMS/core/issues/8848 | Issue Tracking Patch |
Configurations
History
21 Nov 2024, 02:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://dotcms.com/security/SI-35 - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/94992 - | |
References | () https://github.com/dotCMS/core/issues/8848 - Issue Tracking, Patch |
Information
Published : 2016-12-19 22:59
Updated : 2024-11-21 02:48
NVD link : CVE-2016-2355
Mitre link : CVE-2016-2355
CVE.ORG link : CVE-2016-2355
JSON object : View
Products Affected
dotcms
- dotcms
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')