{"vulnerability": "CVE-2022-37033", "sightings": [{"uuid": "1d9127f7-dc0b-46c7-9af8-5b618495b3a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37033", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9124", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-37033\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In dotCMS 5.x-22.06, TempFileAPI allows a user to create a temporary file based on a passed in URL, while attempting to block any SSRF access to local IP addresses or private subnets. In resolving this URL, the TempFileAPI follows any 302 redirects that the remote URL returns. Because there is no re-validation of the redirect URL, the TempFileAPI can be used to return data from those local/private hosts that should not be accessible remotely.\n\ud83d\udccf Published: 2023-02-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-27T16:21:33.289Z\n\ud83d\udd17 References:\n1. https://www.dotcms.com/security/SI-64", "creation_timestamp": "2025-03-27T16:26:46.000000Z"}, {"uuid": "439f8969-0987-4094-9a6c-e086e6ddf43a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-37033", "type": "seen", "source": "https://t.me/cibsecurity/57355", "content": "\u203c CVE-2022-37033 \u203c\n\nIn dotCMS 5.x-22.06, TempFileAPI allows a user to create a temporary file based on a passed in URL, while attempting to block any SSRF access to local IP addresses or private subnets. In resolving this URL, the TempFileAPI follows any 302 redirects that the remote URL returns. Because there is no re-validation of the redirect URL, the TempFileAPI can be used to return data from those local/private hosts that should not be accessible remotely.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-02T00:16:30.000000Z"}]}