CVE-2022-37033
CVSS V2 None
CVSS V3 None
Description
In dotCMS 5.x-22.06, TempFileAPI allows a user to create a temporary file based on a passed in URL, while attempting to block any SSRF access to local IP addresses or private subnets. In resolving this URL, the TempFileAPI follows any 302 redirects that the remote URL returns. Because there is no re-validation of the redirect URL, the TempFileAPI can be used to return data from those local/private hosts that should not be accessible remotely.
Overview
- CVE ID
- CVE-2022-37033
- Assigner
- cve@mitre.org
- Vulnerability Status
- Analyzed
- Published Version
- 2023-02-01T22:15:08
- Last Modified Date
- 2023-02-09T19:35:45
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:dotcms:dotcms:*:*:*:*:lts:*:*:* | 1 | OR | 21.06.12 | |
cpe:2.3:a:dotcms:dotcms:*:*:*:*:-:*:*:* | 1 | OR | 5.2.0 | 22.08 |
cpe:2.3:a:dotcms:dotcms:*:*:*:*:lts:*:*:* | 1 | OR | 22.03 | 22.03.4 |
References
Reference URL | Reference Tags |
---|---|
https://www.dotcms.com/security/SI-64 | Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-37033 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37033 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 07:05:58 | Added to TrackCVE | |||
2023-04-17 07:06:00 | Weakness Enumeration | new |