This affects the package plupload before 2.3.9. A file name containing JavaScript code could be uploaded and run. An attacker would need to trick a user to upload this kind of file.
References
Configurations
History
21 Nov 2024, 05:51
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 4.2 |
References | () https://github.com/moxiecode/plupload/blob/master/js/jquery.plupload.queue/jquery.plupload.queue.js%23L226 - Broken Link | |
References | () https://github.com/moxiecode/plupload/commit/d12175d4b5fa799b994ee1bb17bfbeec55b386fb - Patch, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2306665 - Patch, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2306663 - Patch, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMOXIECODE-2306664 - Patch, Third Party Advisory | |
References | () https://snyk.io/vuln/SNYK-JS-PLUPLOAD-1583909 - Patch, Third Party Advisory |
Information
Published : 2021-12-03 20:15
Updated : 2024-11-21 05:51
NVD link : CVE-2021-23562
Mitre link : CVE-2021-23562
CVE.ORG link : CVE-2021-23562
JSON object : View
Products Affected
tiny
- plupload
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type