Описание
An arbitrary file upload vulnerability in the file upload module of Tiddlywiki5 v5.2.2 allows attackers to execute arbitrary code via a crafted SVG file. Note: The vendor argues that this is not a legitimate issue and there is no vulnerability here.
Ссылки
- Broken LinkProductURL Repurposed
- Third Party Advisory
- Third Party Advisory
- ExploitThird Party Advisory
- Broken LinkProductURL Repurposed
- Third Party Advisory
- Third Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:tiddlywiki:tiddlywiki5:5.2.2:*:*:*:*:*:*:*
EPSS
Процентиль: 80%
0.01353
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-434
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
Withdrawn: Code execution via SVG file upload in tiddlywiki
EPSS
Процентиль: 80%
0.01353
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-434