A cross-site scripting (XSS) vulnerability in the fileNameStr parameter of jQuery-Upload-File v4.0.11 allows attackers to execute arbitrary web scripts or HTML via a crafted file with a Javascript payload in the file name.
References
Link | Resource |
---|---|
http://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js | Third Party Advisory |
http://hayageek.github.io/jQuery-Upload-File/4.0.11/jquery.uploadfile.min.js | Third Party Advisory |
http://hayageek.github.io/jQuery-Upload-File/4.0.11/uploadfile.css | Third Party Advisory |
http://haygeek.com | Broken Link |
http://jquery-upload-file.com | Broken Link URL Repurposed |
https://github.com/hayageek/jquery-upload-file/blob/master/js/jquery.uploadfile.js#L469 | Third Party Advisory |
https://raw.githubusercontent.com/hayageek/jquery-upload-file/master/js/jquery.uploadfile.js | Third Party Advisory |
Configurations
History
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://jquery-upload-file.comĀ - Broken Link, URL Repurposed |
Information
Published : 2022-02-25 19:15
Updated : 2024-02-28 19:09
NVD link : CVE-2021-37504
Mitre link : CVE-2021-37504
CVE.ORG link : CVE-2021-37504
JSON object : View
Products Affected
hayageek
- jquery_upload_file
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')