Issue: |
|
---|---|
Date: |
|
Severity: | Medium |
Requires Admin Access: | Yes |
Fix Version: | 20.10.1, 5.3.8 LTS |
Credit: | xiaozhicai (github) |
Description: |
dotCMS 5.0 through 5.3.9 allows SQL injection by an authenticated user via the system REST api using the endpoint /api/v1/containers. The classes that are used to paginate results of some REST requests do not sanitize the orderBy parameter and in some cases is vulnerable to SQL injection attacks. A user must be an authenticated manager in the dotCMS system to |
Mitigation: |
An OSGI plugin that mitigates the issue for versions 5.0.3-5.3.9 can be found here: The plugin is compatible with dotCMS 5.0.3 up to 5.3.9. |
References |
Report: CVE: Github Issue: |