CVE-2022-37033

In dotCMS 5.x-22.06, TempFileAPI allows a user to create a temporary file based on a passed in URL, while attempting to block any SSRF access to local IP addresses or private subnets. In resolving this URL, the TempFileAPI follows any 302 redirects that the remote URL returns. Because there is no re-validation of the redirect URL, the TempFileAPI can be used to return data from those local/private hosts that should not be accessible remotely.
References
Link Resource
https://www.dotcms.com/security/SI-64 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:dotcms:dotcms:*:*:*:*:lts:*:*:*
cpe:2.3:a:dotcms:dotcms:*:*:*:*:-:*:*:*
cpe:2.3:a:dotcms:dotcms:*:*:*:*:lts:*:*:*

History

09 Feb 2023, 19:35

Type Values Removed Values Added
First Time Dotcms dotcms
Dotcms
CPE cpe:2.3:a:dotcms:dotcms:*:*:*:*:-:*:*:*
cpe:2.3:a:dotcms:dotcms:*:*:*:*:lts:*:*:*
References (MISC) https://www.dotcms.com/security/SI-64 - (MISC) https://www.dotcms.com/security/SI-64 - Vendor Advisory
CWE CWE-918
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

01 Feb 2023, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-02-01 22:15

Updated : 2023-12-10 14:48


NVD link : CVE-2022-37033

Mitre link : CVE-2022-37033

CVE.ORG link : CVE-2022-37033


JSON object : View

Products Affected

dotcms

  • dotcms
CWE
CWE-918

Server-Side Request Forgery (SSRF)