DotCMS.ajax_file_upload.Arbitrary.File.Upload
Description
This indicates an attack attempt to exploit an Arbitrary File Upload vulnerability in DotCMS.
The vulnerability is caused by a lack of sanitizing the "filename" parameter that is passed to "ajax_file_upload". A remote attacker can exploit this to send a crafted HTTP POST request to execute arbitrary code on vulnerable systems.
Affected Products
dotCMS 4.1.1
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://github.com/dotCMS/core/issues/12131
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |