Description
An issue was discovered in dotCMS through 3.6.1. The findChildrenByFilter() function which is called by the web accessible path /categoriesServlet performs string interpolation and direct SQL query execution. SQL quote escaping and a keyword blacklist were implemented in a new class, SQLUtil (main/java/com/dotmarketing/common/util/SQLUtil.java), as part of the remediation of CVE-2016-8902; however, these can be overcome in the case of the q and inode parameters to the /categoriesServlet path. Overcoming these controls permits a number of blind boolean SQL injection vectors in either parameter. The /categoriesServlet web path can be accessed remotely and without authentication in a default dotCMS deployment.
Remediation
References
Related Vulnerabilities
WordPress Plugin Carousel slideshow Arbitrary File Upload (3.11)
WordPress Plugin Chained Quiz Cross-Site Scripting (1.1.8.1)
WordPress Plugin YouTube Advanced by Embed Plus Cross-Site Scripting (5.3)
Envoy Proxy Use of Incorrectly-Resolved Name or Reference Vulnerability (CVE-2019-9901)
WordPress Plugin Ocean Extra Cross-Site Request Forgery (1.6.5)