Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:dotcms:dotcms:*:*:*:*:lts:*:*:*", "matchCriteriaId": "AF4F4D8E-0270-4FFB-BD5F-B654C4D2E8D8", "versionEndExcluding": "5.3.8.12", "versionStartIncluding": "5.3.8", "vulnerable": true}, {"criteria": "cpe:2.3:a:dotcms:dotcms:*:*:*:*:lts:*:*:*", "matchCriteriaId": "FC366033-F8CF-4490-9ED5-B61175A05A04", "versionEndExcluding": "21.06.9", "versionStartIncluding": "21.06", "vulnerable": true}, {"criteria": "cpe:2.3:a:dotcms:dotcms:*:*:*:*:*:*:*:*", "matchCriteriaId": "04FF0C01-D5D3-4F4E-90B7-01C2B061D96D", "versionEndExcluding": "22.06", "versionStartIncluding": "22.01", "vulnerable": true}, {"criteria": "cpe:2.3:a:dotcms:dotcms:*:*:*:*:lts:*:*:*", "matchCriteriaId": "B1FE64DC-D25A-4C34-B174-0B92225E0851", "versionEndExcluding": "22.03.2", "versionStartIncluding": "22.03", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "dotCMS before 22.06 allows remote attackers to bypass intended access control and obtain sensitive information by using a semicolon in a URL to introduce a matrix parameter. (This is also fixed in 5.3.8.12, 21.06.9, and 22.03.2 for LTS users.) Some Java application frameworks, including those used by Spring or Tomcat, allow the use of matrix parameters: these are URI parameters separated by semicolons. Through precise semicolon placement in a URI, it is possible to exploit this feature to avoid dotCMS's path-based XSS prevention (such as \"require login\" filters), and consequently access restricted resources. For example, an attacker could place a semicolon immediately before a / character that separates elements of a filesystem path. This could reveal file content that is ordinarily only visible to signed-in users. This issue can be chained with other exploit code to achieve XSS attacks against dotCMS."}, {"lang": "es", "value": "dotCMS anterior a 22.06 permite a atacantes remotos omitir el control de acceso previsto y obtener informaci\u00f3n confidencial utilizando un punto y coma en una URL para introducir un par\u00e1metro de matriz. (Esto tambi\u00e9n se corrigi\u00f3 en 5.3.8.12, 21.06.9 y 22.03.2 para usuarios de LTS). Algunos frameworks de aplicaciones Java, incluidos los utilizados por Spring o Tomcat, permiten el uso de par\u00e1metros matriciales: estos son par\u00e1metros URI separados por punto y coma. Mediante la colocaci\u00f3n precisa de punto y coma en un URI, es posible explotar esta caracter\u00edstica para evitar la prevenci\u00f3n XSS basada en rutas de dotCMS (como los filtros \"requerir inicio de sesi\u00f3n\") y, en consecuencia, acceder a recursos restringidos. Por ejemplo, un atacante podr\u00eda colocar un punto y coma inmediatamente antes del car\u00e1cter / que separa los elementos de una ruta del sistema de archivos. Esto podr\u00eda revelar contenido del archivo que normalmente solo es visible para los usuarios que han iniciado sesi\u00f3n. Este problema se puede encadenar con otro c\u00f3digo de explotaci\u00f3n para lograr ataques XSS contra dotCMS."}], "id": "CVE-2022-35740", "lastModified": "2025-05-01T14:15:25.520", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary"}]}, "published": "2022-11-10T21:15:10.230", "references": [{"source": "cve@mitre.org", "tags": ["Exploit", "Third Party Advisory"], "url": "https://github.com/dotCMS/patches-hotfixes/tree/master/com.dotcms.security.matrixparams"}, {"source": "cve@mitre.org", "tags": ["Exploit", "Mitigation", "Vendor Advisory"], "url": "https://www.dotcms.com/security/SI-63"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Third Party Advisory"], "url": "https://github.com/dotCMS/patches-hotfixes/tree/master/com.dotcms.security.matrixparams"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit", "Mitigation", "Vendor Advisory"], "url": "https://www.dotcms.com/security/SI-63"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}, {"description": [{"lang": "en", "value": "CWE-79"}], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary"}]}