CVE-2023-3042
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
17/10/2023
Last modified:
30/09/2024
Description
In dotCMS, versions mentioned, a flaw in the NormalizationFilter does not strip double slashes (//) from URLs, potentially enabling bypasses for XSS and access controls. An example affected URL is https://demo.dotcms.com//html/portlet/ext/files/edit_text_inc.jsp , which should return a 404 response but didn&#39;t. <br />
<br />
The oversight in the default invalid URL character list can be viewed at the provided GitHub link https://github.com/dotCMS/core/blob/master/dotCMS/src/main/java/com/dotcms/filters/NormalizationFilter.java#L37 . <br />
<br />
To mitigate, users can block URLs with double slashes at firewalls or utilize dotCMS config variables.<br />
<br />
Specifically, they can use the DOT_URI_NORMALIZATION_FORBIDDEN_STRINGS environmental variable to add // to the list of invalid strings. <br />
<br />
Additionally, the DOT_URI_NORMALIZATION_FORBIDDEN_REGEX variable offers more detailed control, for instance, to block //html.* URLs.<br />
<br />
Fix Version:23.06+, LTS 22.03.7+, LTS 23.01.4+
Impact
Base Score 3.x
6.10
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:dotcms:dotcms:5.3.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dotcms:dotcms:21.06:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dotcms:dotcms:22.03:*:*:*:*:*:*:* | ||
| cpe:2.3:a:dotcms:dotcms:23.01:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



