Vulnerability Description
In dotCMS 5.x-22.06, TempFileAPI allows a user to create a temporary file based on a passed in URL, while attempting to block any SSRF access to local IP addresses or private subnets. In resolving this URL, the TempFileAPI follows any 302 redirects that the remote URL returns. Because there is no re-validation of the redirect URL, the TempFileAPI can be used to return data from those local/private hosts that should not be accessible remotely.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dotcms | Dotcms | < 21.06.12 |
Related Weaknesses (CWE)
References
- https://www.dotcms.com/security/SI-64Vendor Advisory
- https://www.dotcms.com/security/SI-64Vendor Advisory
FAQ
What is CVE-2022-37033?
CVE-2022-37033 is a vulnerability with a CVSS score of 6.5 (MEDIUM). In dotCMS 5.x-22.06, TempFileAPI allows a user to create a temporary file based on a passed in URL, while attempting to block any SSRF access to local IP addresses or private subnets. In resolving thi...
How severe is CVE-2022-37033?
CVE-2022-37033 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-37033?
Check the references section above for vendor advisories and patch information. Affected products include: Dotcms Dotcms.