Description
dotCMS before 5.2.4 is vulnerable to directory traversal, leading to incorrect access control. It allows an attacker to read or execute files under $TOMCAT_HOME/webapps/ROOT/assets (which should be a protected directory). Additionally, attackers can upload temporary files (e.g., .jsp files) into /webapps/ROOT/assets/tmp_upload, which can lead to remote command execution (with the permissions of the user running the dotCMS application).
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T09:11:04.663Z
Reserved: 2020-01-09T00:00:00.000Z
Link: CVE-2020-6754
No data.
Status : Modified
Published: 2020-02-05T17:15:10.537
Modified: 2024-11-21T05:36:08.213
Link: CVE-2020-6754
No data.
OpenCVE Enrichment
No data.