Описание
Multiple cross-site scripting (XSS) vulnerabilities in Papermerge before 1.5.2 allow remote attackers to inject arbitrary web script or HTML via the rename, tag, upload, or create folder function. The payload can be in a folder, a tag, or a document's filename. If email consumption is configured in Papermerge, a malicious document can be sent by email and is automatically uploaded into the Papermerge web application. Therefore, no authentication is required to exploit XSS if email consumption is configured. Otherwise authentication is required.
Ссылки
- Third Party Advisory
- Release NotesThird Party Advisory
- Product
- Third Party Advisory
- Release NotesThird Party Advisory
- Product
Уязвимые конфигурации
Конфигурация 1Версия до 1.5.2 (исключая)
cpe:2.3:a:papermerge:papermerge:*:*:*:*:*:*:*:*
EPSS
Процентиль: 64%
0.00467
Низкий
6.1 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-79
Связанные уязвимости
EPSS
Процентиль: 64%
0.00467
Низкий
6.1 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
CWE-79