Arbitrary file upload vulnerability in com/dotmarketing/servlets/AjaxFileUploadServlet.class in dotCMS 4.1.1 allows remote authenticated administrators to upload .jsp files to arbitrary locations via directory traversal sequences in the fieldName parameter to servlets/ajax_file_upload. This results in arbitrary code execution by requesting the .jsp file at a /assets URI.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T18:12:39.823Z
Reserved: 2017-07-19T00:00:00
Link: CVE-2017-11466

No data.

Status : Modified
Published: 2017-07-20T00:29:00.353
Modified: 2024-11-21T03:07:50.540
Link: CVE-2017-11466

No data.