DotCMS.ajax_file_upload.Arbitrary.File.Upload

description-logoDescription

This indicates an attack attempt to exploit an Arbitrary File Upload vulnerability in DotCMS.
The vulnerability is caused by a lack of sanitizing the "filename" parameter that is passed to "ajax_file_upload". A remote attacker can exploit this to send a crafted HTTP POST request to execute arbitrary code on vulnerable systems.

affected-products-logoAffected Products

dotCMS 4.1.1

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://github.com/dotCMS/core/issues/12131

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)