Vulnerability Details CVE-2017-5344
An issue was discovered in dotCMS through 3.6.1. The findChildrenByFilter() function which is called by the web accessible path /categoriesServlet performs string interpolation and direct SQL query execution. SQL quote escaping and a keyword blacklist were implemented in a new class, SQLUtil (main/java/com/dotmarketing/common/util/SQLUtil.java), as part of the remediation of CVE-2016-8902; however, these can be overcome in the case of the q and inode parameters to the /categoriesServlet path. Overcoming these controls permits a number of blind boolean SQL injection vectors in either parameter. The /categoriesServlet web path can be accessed remotely and without authentication in a default dotCMS deployment.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.081
EPSS Ranking 91.7%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2017-5344
-
cpe:2.3:a:dotcms:dotcms:1.9
-
cpe:2.3:a:dotcms:dotcms:1.9.2.1
-
cpe:2.3:a:dotcms:dotcms:1.9.5.1
-
cpe:2.3:a:dotcms:dotcms:2.0
-
cpe:2.3:a:dotcms:dotcms:2.0.1
-
cpe:2.3:a:dotcms:dotcms:2.1
-
cpe:2.3:a:dotcms:dotcms:2.1.1
-
cpe:2.3:a:dotcms:dotcms:2.2
-
cpe:2.3:a:dotcms:dotcms:2.2.1
-
cpe:2.3:a:dotcms:dotcms:2.3
-
cpe:2.3:a:dotcms:dotcms:2.3.1
-
cpe:2.3:a:dotcms:dotcms:2.3.2
-
cpe:2.3:a:dotcms:dotcms:2.5
-
cpe:2.3:a:dotcms:dotcms:2.5.1
-
cpe:2.3:a:dotcms:dotcms:2.5.2
-
cpe:2.3:a:dotcms:dotcms:2.5.3
-
cpe:2.3:a:dotcms:dotcms:2.5.4
-
cpe:2.3:a:dotcms:dotcms:3.0
-
cpe:2.3:a:dotcms:dotcms:3.0.1
-
cpe:2.3:a:dotcms:dotcms:3.1
-
cpe:2.3:a:dotcms:dotcms:3.2
-
cpe:2.3:a:dotcms:dotcms:3.2.1
-
cpe:2.3:a:dotcms:dotcms:3.2.2
-
cpe:2.3:a:dotcms:dotcms:3.2.3
-
cpe:2.3:a:dotcms:dotcms:3.2.4
-
cpe:2.3:a:dotcms:dotcms:3.3
-
cpe:2.3:a:dotcms:dotcms:3.3.1
-
cpe:2.3:a:dotcms:dotcms:3.3.2
-
cpe:2.3:a:dotcms:dotcms:3.5
-
cpe:2.3:a:dotcms:dotcms:3.5.1
-
cpe:2.3:a:dotcms:dotcms:3.6.0
-
cpe:2.3:a:dotcms:dotcms:3.6.1