Vulnerability Description
System->Maintenance-> Log Files in dotCMS dashboard is providing the username/password for database connections in the log output. Nevertheless, this is a moderate issue as it requires a backend admin as well as that dbs are locked down by environment. OWASP Top 10 - A05) Insecure Design OWASP Top 10 - A05) Security Misconfiguration OWASP Top 10 - A09) Security Logging and Monitoring Failure
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dotcms | Dotcms | >= 22.02, < 22.03.15 |
Related Weaknesses (CWE)
References
- https://github.com/dotCMS/core/issues/27910Issue Tracking
- https://github.com/dotCMS/core/pull/28006Issue Tracking
- https://www.dotcms.com/security/SI-70Broken Link
- https://github.com/dotCMS/core/issues/27910Issue Tracking
- https://github.com/dotCMS/core/pull/28006Issue Tracking
- https://www.dotcms.com/security/SI-70Broken Link
FAQ
What is CVE-2024-3165?
CVE-2024-3165 is a vulnerability with a CVSS score of 4.5 (MEDIUM). System->Maintenance-> Log Files in dotCMS dashboard is providing the username/password for database connections in the log output. Nevertheless, this is a moderate issue as it requires a backend admin...
How severe is CVE-2024-3165?
CVE-2024-3165 has been rated MEDIUM with a CVSS base score of 4.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-3165?
Check the references section above for vendor advisories and patch information. Affected products include: Dotcms Dotcms.