In dotCMS 5.x-22.06, TempFileAPI allows a user to create a temporary file based on a passed in URL, while attempting to block any SSRF access to local IP addresses or private subnets. In resolving this URL, the TempFileAPI follows any 302 redirects that the remote URL returns. Because there is no re-validation of the redirect URL, the TempFileAPI can be used to return data from those local/private hosts that should not be accessible remotely.
References
Link | Resource |
---|---|
https://www.dotcms.com/security/SI-64 | Vendor Advisory |
https://www.dotcms.com/security/SI-64 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.dotcms.com/security/SI-64 - Vendor Advisory |
Information
Published : 2023-02-01 22:15
Updated : 2024-11-21 07:14
NVD link : CVE-2022-37033
Mitre link : CVE-2022-37033
CVE.ORG link : CVE-2022-37033
JSON object : View
Products Affected
dotcms
- dotcms
CWE
CWE-918
Server-Side Request Forgery (SSRF)