Описание
XSS via uploaded gpx file
A malicious content author could upload a GPX file with a Javascript payload. The payload could then be executed by luring a legitimate user to view the file in a browser with support for GPX files. GPX is an XML-based format used to store GPS data.
By default, Silverstripe CMS will no longer allow GPX files to be uploaded to the assets area.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2022-38147
- https://forum.silverstripe.org/c/releases
- https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/assets/CVE-2022-38147.yaml
- https://www.silverstripe.org/blog/tag/release
- https://www.silverstripe.org/download/security-releases
- https://www.silverstripe.org/download/security-releases/cve-2022-38147
Пакеты
Наименование
silverstripe/assets
composer
Затронутые версииВерсия исправления
>= 1.0.0, < 1.11.1
1.11.1
Связанные уязвимости
CVSS3: 5.4
nvd
около 3 лет назад
Silverstripe silverstripe/framework through 4.11 allows XSS (issue 3 of 3).