script.php in Jirafeau before 3.4.1 is affected by two stored Cross-Site Scripting (XSS) vulnerabilities. These are stored within the shared files description file and allow the execution of a JavaScript payload each time an administrator searches or lists uploaded files. These two injections could be triggered without authentication, and target the administrator. The attack vectors are the Content-Type field and the filename parameter.
References
Link | Resource |
---|---|
https://www.bishopfox.com/news/2018/06/jirafeau-version-3-3-0-multiple-vulnerabilities/ | Exploit Third Party Advisory |
https://www.bishopfox.com/news/2018/06/jirafeau-version-3-3-0-multiple-vulnerabilities/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.bishopfox.com/news/2018/06/jirafeau-version-3-3-0-multiple-vulnerabilities/ - Exploit, Third Party Advisory |
Information
Published : 2018-07-07 17:29
Updated : 2024-11-21 03:43
NVD link : CVE-2018-11351
Mitre link : CVE-2018-11351
CVE.ORG link : CVE-2018-11351
JSON object : View
Products Affected
jirafeau
- jirafeau
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')