Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4vm8-j95f-j6v5

Опубликовано: 14 июл. 2022
Источник: github
Github: Прошло ревью
CVSS3: 4.6

Описание

Strapi 4.1.12 Cross-site Scripting via crafted file

An unrestricted file upload vulnerability in the Add New Assets function of Strapi v4.1.12 allows attackers to execute arbitrary code via a crafted file. After an authenticated attacker uploads a file containing a malicious URL, a victim copies and pastes the malicious URL into a new tab to receive the XSS payload.

Пакеты

Наименование

@strapi/strapi

npm
Затронутые версииВерсия исправления

<= 4.1.12

Отсутствует

EPSS

Процентиль: 83%
0.01882
Низкий

4.6 Medium

CVSS3

Дефекты

CWE-434
CWE-79

Связанные уязвимости

CVSS3: 8.8
nvd
больше 3 лет назад

An unrestricted file upload vulnerability in the Add New Assets function of Strapi 4.1.12 allows attackers to conduct XSS attacks via a crafted PDF file. NOTE: the project documentation suggests that a user with the Media Library "Create (upload)" permission is supposed to be able to upload PDF files containing JavaScript, and that all files in a public assets folder are accessible to the outside world (unless the filename begins with a dot character). The administrator can choose to allow only image, video, and audio files (i.e., not PDF) if desired.

EPSS

Процентиль: 83%
0.01882
Низкий

4.6 Medium

CVSS3

Дефекты

CWE-434
CWE-79