DOTCMS4.1.1任意文件上传漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

Recetly, I found an Arbitrary File Upload Vulnerability in 'DotCMS' program, DotCMS is widely used in many companies. Vulnerable cgi: /dotcms_4.1.1_999999.jar!/com/dotmarketing/servlets/AjaxFileUploadServlet.class: ``` private void doFileUpload(HttpSession session, HttpServletRequest request, HttpServletResponse response) throws IOException { String fieldName = null; AjaxFileUploadListener listener = null; try { String fileName = ""; listener = new AjaxFileUploadListener(request.getContentLength()); FileItemFactory factory = new MonitoredDiskFileItemFactory(listener); fieldName = request.getParameter("fieldName"); Enumeration params = request.getParameterNames(); session.setAttribute("FILE_UPLOAD_STATS_" + fieldName, listener.getFileUploadStats()); ServletFileUpload upload = new ServletFileUpload(factory); List items = upload.parseRequest(request); boolean hasError = false; this.isEmptyFile = false; String userId = null; if (UtilMethods.isSet(session.getAttribute("USER_ID"))) {...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息