dotCMS before 5.2.4 is vulnerable to directory traversal, leading to incorrect access control. It allows an attacker to read or execute files under $TOMCAT_HOME/webapps/ROOT/assets (which should be a protected directory). Additionally, attackers can upload temporary files (e.g., .jsp files) into /webapps/ROOT/assets/tmp_upload, which can lead to remote command execution (with the permissions of the user running the dotCMS application).
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T09:11:04.663Z
Reserved: 2020-01-09T00:00:00
Link: CVE-2020-6754
No data.
Status : Modified
Published: 2020-02-05T17:15:10.537
Modified: 2024-11-21T05:36:08.213
Link: CVE-2020-6754
No data.
OpenCVE Enrichment
No data.