Описание
Firefly III before 4.7.17.3 is vulnerable to stored XSS due to lack of filtration of user-supplied data in image file names. The JavaScript code is executed during attachments/edit/$file_id$ attachment editing. NOTE: It is asserted that an attacker must have the same access rights as the user in order to be able to execute the vulnerability
Ссылки
- PatchThird Party Advisory
- ExploitThird Party Advisory
- PatchThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 4.7.17.3 (исключая)
cpe:2.3:a:firefly-iii:firefly_iii:*:*:*:*:*:*:*:*
EPSS
Процентиль: 51%
0.00281
Низкий
5.4 Medium
CVSS3
3.5 Low
CVSS2
Дефекты
CWE-79
Связанные уязвимости
EPSS
Процентиль: 51%
0.00281
Низкий
5.4 Medium
CVSS3
3.5 Low
CVSS2
Дефекты
CWE-79