Intrusion Prevention

DotCMS.ajax_file_upload.Arbitrary.File.Upload

Description

This indicates an attack attempt to exploit an Arbitrary File Upload vulnerability in DotCMS.
The vulnerability is caused by a lack of sanitizing the "filename" parameter that is passed to "ajax_file_upload". A remote attacker can exploit this to send a crafted HTTP POST request to execute arbitrary code on vulnerable systems.

Affected Products

dotCMS 4.1.1

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.
https://github.com/dotCMS/core/issues/12131

CVE References

CVE-2017-11466