漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
The dotCMS administration panel, versions 3.7.1 and earlier, "Push Publishing" feature in Enterprise Pro is vulnerable to path traversal
漏洞信息
The dotCMS administration panel, versions 3.7.1 and earlier, "Push Publishing" feature in Enterprise Pro is vulnerable to path traversal. When "Bundle" tar.gz archives uploaded to the Push Publishing feature are decompressed, the filenames of its contents are not properly checked, allowing for writing files to arbitrary directories on the file system. These archives may be uploaded directly via the administrator panel, or using the CSRF vulnerability (CVE-2017-3187). An unauthenticated remote attacker may perform actions with the dotCMS administrator panel with the same permissions of a victim user or execute arbitrary system commands with the permissions of the user running the dotCMS application.
漏洞信息
N/A
漏洞
对路径名的限制不恰当(路径遍历)
漏洞
dotCMS 路径遍历漏洞
漏洞信息
dotCMS是美国dotCMS公司的一套内容管理系统(CMS)。该系统支持RSS订阅、博客、论坛等模块,并具有易于扩展和构建的特点。 dotCMS 3.7.1及之前版本中的管理面板的Push Publishing功能存在路径遍历漏洞,该漏洞源于在解压上传到Push Publishing功能的‘Bundle’tar.gz归档文件时,程序没有正确的验证文件名。攻击者可利用该漏洞向文件系统的任意目录写入文件,以用户权限执行操作或执行任意的系统命令。
漏洞信息
N/A
漏洞
N/A