Skip to main content

This content has been archived and is no longer being updated. Links may not function; however, this content may be relevant to outdated versions of the product.

Support Article

Able to upload malicious files to Pega Cloud File Storage

SA-60627

Summary



User can upload malicious files to Pega Cloud File Storage. The file storage does not detect EICAR files.


Error Messages



Not Applicable


Steps to Reproduce



Drag and drop malicious files to Pega Cloud File Storage system.


Root Cause



A defect in Pegasystems’ code or rules.

With the 'Select Files' option, the file is uploaded to the Service Export Directory on the server. This initiated the anti-virus run and the file is quarantined if it had a virus. In the 'Uploading file with 'drag-drop' option, the file is sent as a form parameter to the server. This skipped the anti-virus run because the uploaded file is not a physical file on the server directory but sent as a form parameter in the HTTP request (POST).



Resolution



Apply HFix-45292.


 

Published July 23, 2018 - Updated October 8, 2020

Was this useful?

0% found this useful

Have a question? Get answers now.

Visit the Collaboration Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega Community has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice
Contact us