| Issue: |
|
|---|---|
| Date: |
|
| Severity: | Medium |
| Requires Admin Access: | Yes |
| Fix Version: | 22.12+, LTS 21.06.12+, LTS 22.03.4+ |
| Credit: | Christos - Minas Mathas |
| Description: |
An authenticated directory traversal vulnerability in dotCMS API can lead to RCE. A zip file at the "/api/integrity/_fixconflictsfromremote" endpoint is accepted and extracted without performing path traversal check. This can be exploited by sending a specially crafted zip file which contains directory traversal characters in the file content names (/../../xyz.sh). This allows for the contents to be extracted at an arbitrary path inside the system. This vulnerability requires Admin privileges to exploit. |
| Mitigation: |
|
| References |
|