Arbitrary file upload vulnerability in com/dotmarketing/servlets/AjaxFileUploadServlet.class in dotCMS 4.1.1 allows remote authenticated administrators to upload .jsp files to arbitrary locations via directory traversal sequences in the fieldName parameter to servlets/ajax_file_upload. This results in arbitrary code execution by requesting the .jsp file at a /assets URI.
References
Link Resource
http://seclists.org/fulldisclosure/2017/Jul/33 Exploit Mailing List Third Party Advisory
https://github.com/dotCMS/core/issues/12131 Issue Tracking Patch Third Party Advisory
https://packetstormsecurity.com/files/143383/dotcms411-shell.txt Exploit Third Party Advisory VDB Entry
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2017-07-20T00:00:00

Updated: 2017-07-20T00:57:01

Reserved: 2017-07-19T00:00:00


Link: CVE-2017-11466

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-07-20T00:29:00.353

Modified: 2017-07-25T14:59:20.933


Link: CVE-2017-11466

JSON object: View

cve-icon Redhat Information

No data.

CWE