Patrowl.PatrowlManager.Unrestricted.File.Upload
Description
This indicates an attack attempt to exploit an Unrestricted File Upload Vulnerability in Patrowl PatrowlManager.
This vulnerability is due to improper input validation when uploading files. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability can result in cross site scripting attacks and other forms of code injection.
Affected Products
Patrowl PatrowlManager prior to 1.7.7
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://github.com/Patrowl/PatrowlManager/security/advisories/GHSA-5hc9-6hq4-2xfx
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |