{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-3938","assignerOrgId":"5b9d93f2-25c7-46b4-ab60-d201718c9dd8","state":"PUBLISHED","assignerShortName":"dotCMS","dateReserved":"2024-04-17T19:20:07.143Z","datePublished":"2024-07-25T21:17:49.359Z","dateUpdated":"2024-08-01T20:26:57.098Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"dotCMS core","vendor":"dotCMS","versions":[{"status":"affected","version":"5.1.5 and after"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>The \"reset password\" login page accepted an HTML injection via URL parameters.</p><p>This has already been rectified via patch, and as such it cannot be demonstrated via Demo site link. Those interested to see the vulnerability may spin up a <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.dotcms.com/docs/latest/previous-releases\">past docker image</a>&nbsp;(prior to dotCMS 24.05.31) and use a link in the following fashion to on their local instance: <a target=\"_blank\" rel=\"nofollow\" href=\"http://localhost:8082/dotAdmin/#/public/login?resetEmailSent=true&amp;resetEmail=%3Ch1%3E%3Ca%20href%3D%22https:%2F%2Fgoogle.com%22%3ECLICK%20ME%3C%2Fa%3E%3C%2Fh1%3E\">http://localhost:8082/dotAdmin/#/public/login?resetEmailSent=true&amp;resetEmail=%3Ch1%3E%3Ca%20href%3D%22https:%2F%2Fgoogle.com%22%3ECLICK%20ME%3C%2Fa%3E%3C%2Fh1%3E</a></p><p>This will result in a view along these lines:<br><img alt=\"Screenshot 2024-07-25 at 121846PMpng\" src=\"https://auth.dotcms.com/dA/3555fb4020/Screenshot%202024-07-25%20at%2012.18.46PM.png?language_id=1\"><br></p><p></p><ul><li>OWASP Top 10 - A03: Injection</li><li>CVSS Score: 5.4</li><li><a target=\"_blank\" rel=\"nofollow\" href=\"https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&amp;version=3.1\">AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N</a></li><li><a target=\"_blank\" rel=\"nofollow\" href=\"https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&amp;version=3.1\">https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&amp;...</a></li></ul><br><p></p><br>"}],"value":"The \"reset password\" login page accepted an HTML injection via URL parameters.\n\nThis has already been rectified via patch, and as such it cannot be demonstrated via Demo site link. Those interested to see the vulnerability may spin up a  http://localhost:8082/dotAdmin/#/public/login?resetEmailSent=true&resetEmail=%3Ch1%3E%3Ca%20href%3D%22https:%2F%2Fgoogle.com%22%3ECLICK%20ME%3C%2Fa%3E%3C%2Fh1%3E \n\nThis will result in a view along these lines:\n\n\n\n\n\n  *  OWASP Top 10 - A03: Injection\n  *  CVSS Score: 5.4\n  *   AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator \n  *   https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&... https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator"}],"impacts":[{"capecId":"CAPEC-248","descriptions":[{"lang":"en","value":"CAPEC-248 Command Injection"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"5b9d93f2-25c7-46b4-ab60-d201718c9dd8","shortName":"dotCMS","dateUpdated":"2024-07-26T13:09:31.162Z"},"references":[{"url":"https://www.dotcms.com/security/SI-71"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-26T17:33:18.822280Z","id":"CVE-2024-3938","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-26T17:33:25.468Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T20:26:57.098Z"},"title":"CVE Program Container","references":[{"url":"https://www.dotcms.com/security/SI-71","tags":["x_transferred"]}]}]}}