CVE-2021-32245

In PageKit v1.0.18, a user can upload SVG files in the file upload portion of the CMS. These SVG files can contain malicious scripts. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to "/storage/exp.svg" that will point to http://localhost/pagekit/storage/exp.svg. When a user comes along to click that link, it will trigger a XSS attack.
References
Link Resource
https://github.com/pagekit/pagekit/issues/963 Exploit Issue Tracking Third Party Advisory
https://github.com/pagekit/pagekit/issues/963 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:pagekit:pagekit:1.0.18:*:*:*:*:*:*:*

History

21 Nov 2024, 06:06

Type Values Removed Values Added
References () https://github.com/pagekit/pagekit/issues/963 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/pagekit/pagekit/issues/963 - Exploit, Issue Tracking, Third Party Advisory

Information

Published : 2021-06-16 21:15

Updated : 2024-11-21 06:06


NVD link : CVE-2021-32245

Mitre link : CVE-2021-32245

CVE.ORG link : CVE-2021-32245


JSON object : View

Products Affected

pagekit

  • pagekit
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')