Описание
LiquidFiles 3.4.15 has stored XSS through the "send email" functionality when sending a file via email to an administrator. When a file has no extension and contains malicious HTML / JavaScript content (such as SVG with HTML content), the payload is executed upon a click. This is fixed in 3.5.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- ExploitMailing ListThird Party Advisory
- ExploitThird Party Advisory
- Vendor Advisory
- Not Applicable
- ExploitThird Party AdvisoryVDB Entry
- ExploitMailing ListThird Party Advisory
- ExploitThird Party Advisory
- Vendor Advisory
- Not Applicable
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:liquidfiles:liquidfiles:3.4.15:*:*:*:*:*:*:*
EPSS
Процентиль: 79%
0.0125
Низкий
5.4 Medium
CVSS3
3.5 Low
CVSS2
Дефекты
CWE-79
Связанные уязвимости
CVSS3: 5.4
github
больше 3 лет назад
LiquidFiles 3.4.15 has stored XSS through the "send email" functionality when sending a file via email to an administrator. When a file has no extension and contains malicious HTML / JavaScript content (such as SVG with HTML content), the payload is executed upon a click. This is fixed in 3.5.
EPSS
Процентиль: 79%
0.0125
Низкий
5.4 Medium
CVSS3
3.5 Low
CVSS2
Дефекты
CWE-79