SQL injection vulnerability in dotCMS before 3.5 allows remote administrators to execute arbitrary SQL commands via the c0-e3 parameter to dwr/call/plaincall/UserAjax.getUsersList.dwr.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://dotcms.com/security/SI-32 | vendor advisory |
http://seclists.org/fulldisclosure/2016/Apr/5 | mailing list |
http://packetstormsecurity.com/files/136548/DotCMS-3.3-SQL-Injection.html | exploit |
http://seclists.org/fulldisclosure/2016/Apr/11 | mailing list |