<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Improper File Upload Validation in Alfresco Forum</title>
    <link>https://connect.hyland.com/t5/alfresco-forum/improper-file-upload-validation/m-p/144545#M38365</link>
    <description>&lt;P&gt;File upload validation is a frequently used technique for checking potentially dangerous uploads in order to ensure that the uploads are safe processing within the code, or when communicating with other components. Incomplete or missing upload validation leads to parts of the system receiving unintended upload.&lt;/P&gt;&lt;P&gt;Penetration tester found that upload feature accepting all file extensions such as .exe, .jsp, .php, etc., we also found that the upload feature also does not have size limitation and also accept any file size when user uploading file to the application.&lt;/P&gt;&lt;P&gt;This improper file upload validation could allows an attacker to delivers a file for malicious intent.&lt;/P&gt;</description>
    <pubDate>Mon, 27 Mar 2023 03:13:53 GMT</pubDate>
    <dc:creator>leochan168</dc:creator>
    <dc:date>2023-03-27T03:13:53Z</dc:date>
    <item>
      <title>Improper File Upload Validation</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/improper-file-upload-validation/m-p/144545#M38365</link>
      <description>&lt;P&gt;File upload validation is a frequently used technique for checking potentially dangerous uploads in order to ensure that the uploads are safe processing within the code, or when communicating with other components. Incomplete or missing upload validation leads to parts of the system receiving unintended upload.&lt;/P&gt;&lt;P&gt;Penetration tester found that upload feature accepting all file extensions such as .exe, .jsp, .php, etc., we also found that the upload feature also does not have size limitation and also accept any file size when user uploading file to the application.&lt;/P&gt;&lt;P&gt;This improper file upload validation could allows an attacker to delivers a file for malicious intent.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 03:13:53 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/improper-file-upload-validation/m-p/144545#M38365</guid>
      <dc:creator>leochan168</dc:creator>
      <dc:date>2023-03-27T03:13:53Z</dc:date>
    </item>
    <item>
      <title>Re: Improper File Upload Validation</title>
      <link>https://connect.hyland.com/t5/alfresco-forum/improper-file-upload-validation/m-p/144546#M38366</link>
      <description>&lt;P&gt;Since the product allows to upload every file type, there are different solutions from Community addons that may help to restrict the mimetypes accepted in the Repository.&lt;/P&gt;
&lt;P&gt;This addon from &lt;A href="https://migration33.stage.lithium.com/t5/user/viewprofilepage/user-id/74498"&gt;@abhinavmishra14&lt;/A&gt; is recommended when dealing with this vulnerability:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://github.com/abhinavmishra14/alfresco-mimetype-blocker" target="_blank" rel="nofollow noopener noreferrer"&gt;https://github.com/abhinavmishra14/alfresco-mimetype-blocker&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 07:56:29 GMT</pubDate>
      <guid>https://connect.hyland.com/t5/alfresco-forum/improper-file-upload-validation/m-p/144546#M38366</guid>
      <dc:creator>angelborroy</dc:creator>
      <dc:date>2023-03-27T07:56:29Z</dc:date>
    </item>
  </channel>
</rss>

