Issues » XSS in Lucene Search Admin tool

Issue: SI-33
Date: Apr 11, 2016, 10:30:00 AM
Severity: Low
Requires Admin Access: Yes
Fix Version: 3.3.2, 3.5
Credit: Piaox From Pingan Product Safety Group
Description:

The lucene search admin tool (Admin only) allows a user to construct and execute a query to run against dotCMS content. The admin tool does not sanitize the query and echo's it back to the user which allows for XSS javascript execution.

Mitigation:

dotCMS 5.2 and above ships with an XSS prevention filter that validates incoming requests to admin urls.  If the incoming request does not include a valid Refer or Origin Header, then the request will be blocked by the filter.  In essence, this blocks an attacker's ability to remotely trigger an XSS or referer vulnerability from a domain outside of the administrative panel.

Versions of dotCMS < 5.2 can install the CSRF osgi plugin that does the same work as the XSS prevention filter.

References

https://packetstormsecurity.com/files/136636/DotCMS-3.5-Beta-Cross-Site-Scripting.html

Highly Rated and Recommended

We're rated Excellent 4.2/5 stars on G2 - with 95+ verified reviews