DotCMS.API.Content.Arbitrary.File.Upload
Description
This indicates an attack attempt to exploit an Arbitrary File Upload Vulnerability in dotCMS.
This vulnerability is due to improper input validation on file names when uploading files through an vulnerable API. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successfully exploiting this vulnerability could result in arbitrary file be saved in target server and lead to remote code execution.
Affected Products
dotCMS version before 22.03
dotCMS version before 21.06.7
dotCMS version before 5.3.8.10
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.dotcms.com/security/SI-62
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |