// For flags

CVE-2018-7669

Sitecore.Net 8.1 - Directory Traversal

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered in Sitecore Sitecore.NET 8.1 rev. 151207 Hotfix 141178-1 and above. The 'Log Viewer' application is vulnerable to a directory traversal attack, allowing an attacker to access arbitrary files from the host Operating System using a sitecore/shell/default.aspx?xmlcontrol=LogViewerDetails&file= URI. Validation is performed to ensure that the text passed to the 'file' parameter correlates to the correct log file directory. This filter can be bypassed by including a valid log filename and then appending a traditional 'dot dot' style attack.

Se ha descubierto un problema en Sitecore Sitecore.NET 8.1 rev. 151207 Hotfix 141178-1 y anteriores. La aplicación "Log Viewer" es vulnerable a un ataque de salto de directorio que permite que un atacante acceda a archivos arbitrarios desde el sistema operativo del host mediante un URI sitecore/shell/default.aspx?xmlcontrol=LogViewerDetailsfile=. Se realiza validación para asegurar que el texto que se pasa al parámetro "file" se correlaciona con el directorio de archivo de registro correcto. Este filtro puede ser omitido incluyendo un nombre de archivo de registro válido y, después, añadiendo un ataque tradicional de estilo "punto punto".

Sitecore.NET version 8.1 suffers from a directory traversal vulnerability.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-03-05 CVE Reserved
  • 2018-04-26 CVE Published
  • 2021-01-26 First Exploit
  • 2024-04-06 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sitecore
Search vendor "Sitecore"
Sitecore.net
Search vendor "Sitecore" for product "Sitecore.net"
>= 8.2
Search vendor "Sitecore" for product "Sitecore.net" and version " >= 8.2"
-
Affected
Sitecore
Search vendor "Sitecore"
Sitecore.net
Search vendor "Sitecore" for product "Sitecore.net"
8.1
Search vendor "Sitecore" for product "Sitecore.net" and version "8.1"
update1
Affected
Sitecore
Search vendor "Sitecore"
Sitecore.net
Search vendor "Sitecore" for product "Sitecore.net"
8.1
Search vendor "Sitecore" for product "Sitecore.net" and version "8.1"
update2
Affected
Sitecore
Search vendor "Sitecore"
Sitecore.net
Search vendor "Sitecore" for product "Sitecore.net"
8.1
Search vendor "Sitecore" for product "Sitecore.net" and version "8.1"
update3
Affected