_get_all_file_server_paths.ajax.php (aka get_all_file_server_paths.ajax.php) in MFScripts YetiShare 3.5.2 through 4.5.3 does not sanitize or encode the output from the fileIds parameter on the page, which would allow an attacker to input HTML or execute scripts on the site, aka XSS.
References
Link | Resource |
---|---|
https://github.com/jra89/CVE-2019-19733 | Exploit Third Party Advisory |
https://medium.com/%40jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 | |
https://github.com/jra89/CVE-2019-19733 | Exploit Third Party Advisory |
https://medium.com/%40jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 |
Configurations
History
21 Nov 2024, 04:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/jra89/CVE-2019-19733 - Exploit, Third Party Advisory | |
References | () https://medium.com/%40jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 - |
07 Nov 2023, 03:07
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-12-30 17:15
Updated : 2024-11-21 04:35
NVD link : CVE-2019-19733
Mitre link : CVE-2019-19733
CVE.ORG link : CVE-2019-19733
JSON object : View
Products Affected
mfscripts
- yetishare
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')