Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-6754

Опубликовано: 05 фев. 2020
Источник: nvd
CVSS3: 9.8
CVSS2: 7.5
EPSS Высокий

Описание

dotCMS before 5.2.4 is vulnerable to directory traversal, leading to incorrect access control. It allows an attacker to read or execute files under $TOMCAT_HOME/webapps/ROOT/assets (which should be a protected directory). Additionally, attackers can upload temporary files (e.g., .jsp files) into /webapps/ROOT/assets/tmp_upload, which can lead to remote command execution (with the permissions of the user running the dotCMS application).

Ссылки

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:*
Версия до 5.2.4 (исключая)

EPSS

Процентиль: 99%
0.75495
Высокий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-22

Связанные уязвимости

github
больше 3 лет назад

dotCMS before 5.2.4 is vulnerable to directory traversal, leading to incorrect access control. It allows an attacker to read or execute files under $TOMCAT_HOME/webapps/ROOT/assets (which should be a protected directory). Additionally, attackers can upload temporary files (e.g., .jsp files) into /webapps/ROOT/assets/tmp_upload, which can lead to remote command execution (with the permissions of the user running the dotCMS application).

EPSS

Процентиль: 99%
0.75495
Высокий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-22