{"id":"CVE-2017-11466","details":"Arbitrary file upload vulnerability in com/dotmarketing/servlets/AjaxFileUploadServlet.class in dotCMS 4.1.1 allows remote authenticated administrators to upload .jsp files to arbitrary locations via directory traversal sequences in the fieldName parameter to servlets/ajax_file_upload. This results in arbitrary code execution by requesting the .jsp file at a /assets URI.","modified":"2026-03-18T11:23:54.305803Z","published":"2017-07-20T00:29:00.353Z","references":[{"type":"FIX","url":"https://github.com/dotCMS/core/issues/12131"},{"type":"EVIDENCE","url":"http://seclists.org/fulldisclosure/2017/Jul/33"},{"type":"EVIDENCE","url":"https://packetstormsecurity.com/files/143383/dotcms411-shell.txt"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dotcms/core","events":[{"introduced":"0"},{"last_affected":"67371d2759506de60b7fdc312cdf6ec1d780699d"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.1.1"}]}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-11466.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}