HTTP: dotCMS H2 Database CategoriesServlet inode SQL Injection

This signature detects attempts to exploit a known vulnerability against dotCMS H2 Database. A successful attack can lead to command injection and arbitrary code execution.

Extended Description

An issue was discovered in dotCMS through 3.6.1. The findChildrenByFilter() function which is called by the web accessible path /categoriesServlet performs string interpolation and direct SQL query execution. SQL quote escaping and a keyword blacklist were implemented in a new class, SQLUtil (main/java/com/dotmarketing/common/util/SQLUtil.java), as part of the remediation of CVE-2016-8902; however, these can be overcome in the case of the q and inode parameters to the /categoriesServlet path. Overcoming these controls permits a number of blind boolean SQL injection vectors in either parameter. The /categoriesServlet web path can be accessed remotely and without authentication in a default dotCMS deployment.

Affected Products

Dotcms dotcms

References

CVE: CVE-2017-5344

Short Name
HTTP:SQL:INJ:DOTCMS-H2-DB
Severity
Critical
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
CVE-2017-5344 CategoriesServlet Database H2 Injection SQL dotCMS inode
Release Date
10/11/2023
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3761
False Positive
Unknown
Vendors

Dotcms

Found a potential security threat?