SQL injection vulnerability in the Workflow Screen in dotCMS before 3.3.2 allows remote administrators to execute arbitrary SQL commands via the orderby parameter.
[
{
"source": "https://github.com/dotcms/core/commit/bc4db5d71dc67015572f8e4c6fdf87e29b854d02",
"id": "CVE-2016-4040-26d5e3a3",
"digest": {
"function_hash": "146553412463661694529665155956298200977",
"length": 902.0
},
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "WorkflowSearcher",
"file": "src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java"
},
"signature_type": "Function"
},
{
"source": "https://github.com/dotcms/core/commit/bc4db5d71dc67015572f8e4c6fdf87e29b854d02",
"id": "CVE-2016-4040-5f779027",
"digest": {
"threshold": 0.9,
"line_hashes": [
"168548086562533713783805126038546190139",
"45393739089889810706477200054240485474",
"49667685965912731254771251782507568244"
]
},
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "src/com/dotmarketing/factories/EmailFactory.java"
},
"signature_type": "Line"
},
{
"source": "https://github.com/dotcms/core/commit/bc4db5d71dc67015572f8e4c6fdf87e29b854d02",
"id": "CVE-2016-4040-72fc4a84",
"digest": {
"threshold": 0.9,
"line_hashes": [
"183110635773772962403820442937360175254",
"109398318881901452971784643168045281612",
"88540287413814294498137852660443171517",
"155034379425858125024455644027391605368",
"135506950140576638110624424402855858996",
"133160561274209008444879932633734323434",
"120496209273316070342038657811520055497",
"85443978690946867411732431428255038325",
"19992149743797101135100577514139435588",
"127958600653692894327406137188774956745",
"95985371943781611890276119361519373811",
"148862143083758759146610132129283791538",
"191798460094123393394033478898197378544",
"158202531139467800518846169706354333925",
"166747397672484010138772718834442634359",
"109841636642039664459818389343207290787"
]
},
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java"
},
"signature_type": "Line"
},
{
"source": "https://github.com/dotcms/core/commit/bc4db5d71dc67015572f8e4c6fdf87e29b854d02",
"id": "CVE-2016-4040-c563e73a",
"digest": {
"function_hash": "176800501469594472534976216634135012135",
"length": 39.0
},
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "getOrderBy",
"file": "src/com/dotmarketing/portlets/workflows/model/WorkflowSearcher.java"
},
"signature_type": "Function"
},
{
"source": "https://github.com/dotcms/core/commit/bc4db5d71dc67015572f8e4c6fdf87e29b854d02",
"id": "CVE-2016-4040-dd723b7e",
"digest": {
"function_hash": "293721798236642630076371622678211121054",
"length": 7446.0
},
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "sendParameterizedEmail",
"file": "src/com/dotmarketing/factories/EmailFactory.java"
},
"signature_type": "Function"
},
{
"source": "https://github.com/dotcms/core/commit/bc4db5d71dc67015572f8e4c6fdf87e29b854d02",
"id": "CVE-2016-4040-ec7dd845",
"digest": {
"threshold": 0.9,
"line_hashes": [
"120760799192413248715899379604117319749",
"243884907574043380725466628929912262363",
"264411183942065243064873136232911912113",
"141689773236307926928748816832140005811"
]
},
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "src/com/dotmarketing/cms/webforms/action/SubmitWebFormAction.java"
},
"signature_type": "Line"
},
{
"source": "https://github.com/dotcms/core/commit/bc4db5d71dc67015572f8e4c6fdf87e29b854d02",
"id": "CVE-2016-4040-f24a06d3",
"digest": {
"function_hash": "186321998741370624673172654221131130721",
"length": 5698.0
},
"signature_version": "v1",
"deprecated": false,
"target": {
"function": "unspecified",
"file": "src/com/dotmarketing/cms/webforms/action/SubmitWebFormAction.java"
},
"signature_type": "Function"
}
]