CVE-2022-35740
dotCMS vulnerability analysis and mitigation

Overview

dotCMS before version 22.06 was found to contain a security vulnerability (CVE-2022-35740) that allows remote attackers to bypass intended access control and obtain sensitive information. The vulnerability affects multiple versions including those before 5.3.8.12, 21.06.9, and 22.03.2 for LTS users. The issue was discovered by Fortinet and reported in June 2022 (Fortinet Blog, DotCMS Advisory).

Technical details

The vulnerability stems from the way dotCMS handles matrix parameters in URLs. Matrix parameters are URI parameters separated by semicolons, which are supported by Java application frameworks including Spring and Tomcat. Through precise placement of semicolons in a URI, attackers can bypass dotCMS's path-based XSS prevention filters and access restricted resources. For example, placing a semicolon immediately before a forward slash character that separates filesystem path elements can reveal file content normally restricted to authenticated users (NVD, DotCMS Advisory).

Impact

The vulnerability allows attackers to bypass access controls and obtain sensitive information that should only be accessible to authenticated users. Additionally, this vulnerability can be chained with other exploit code to achieve Cross-Site Scripting (XSS) attacks against dotCMS (NVD, DotCMS Advisory).

Mitigation and workarounds

The vulnerability has been fixed in dotCMS version 22.06 and later versions. For LTS users, fixes are available in versions 5.3.8.12, 21.06.9, and 22.03.2. Alternative mitigations include creating a WAF rule to disallow semicolons in the URI portion of request URLs, or installing a security interceptor plugin for dotCMS 5.1.6+ available from the official patches repository (DotCMS Advisory, GitHub Patch).

Additional resources


SourceThis report was generated using AI

Related dotCMS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-3938MEDIUM6.1
  • dotCMSdotCMS
  • cpe:2.3:a:dotcms:dotcms
NoYesJul 25, 2024
CVE-2023-3042MEDIUM6.1
  • dotCMSdotCMS
  • cpe:2.3:a:dotcms:dotcms
NoYesOct 17, 2023
CVE-2022-37034MEDIUM5.3
  • dotCMSdotCMS
  • cpe:2.3:a:dotcms:dotcms
NoYesFeb 01, 2023
CVE-2024-3165MEDIUM4.5
  • dotCMSdotCMS
  • cpe:2.3:a:dotcms:dotcms
NoYesApr 01, 2024
CVE-2024-3164MEDIUM4.5
  • dotCMSdotCMS
  • cpe:2.3:a:dotcms:dotcms
NoYesApr 01, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management