Vulnerability Description
An issue was discovered in Sitecore Sitecore.NET 8.1 rev. 151207 Hotfix 141178-1 and above. The 'Log Viewer' application is vulnerable to a directory traversal attack, allowing an attacker to access arbitrary files from the host Operating System using a sitecore/shell/default.aspx?xmlcontrol=LogViewerDetails&file= URI. Validation is performed to ensure that the text passed to the 'file' parameter correlates to the correct log file directory. This filter can be bypassed by including a valid log filename and then appending a traditional 'dot dot' style attack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sitecore | Sitecore.Net | >= 8.2 |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2018/Apr/47ExploitMailing ListThird Party Advisory
- https://kb.sitecore.net/articles/356221Vendor Advisory
- https://www.exploit-db.com/exploits/45152/
- http://seclists.org/fulldisclosure/2018/Apr/47ExploitMailing ListThird Party Advisory
- https://kb.sitecore.net/articles/356221Vendor Advisory
- https://www.exploit-db.com/exploits/45152/
FAQ
What is CVE-2018-7669?
CVE-2018-7669 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered in Sitecore Sitecore.NET 8.1 rev. 151207 Hotfix 141178-1 and above. The 'Log Viewer' application is vulnerable to a directory traversal attack, allowing an attacker to access a...
How severe is CVE-2018-7669?
CVE-2018-7669 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-7669?
Check the references section above for vendor advisories and patch information. Affected products include: Sitecore Sitecore.Net.