A cross-site scripting (XSS) vulnerability in the fileNameStr parameter of jQuery-Upload-File v4.0.11 allows attackers to execute arbitrary web scripts or HTML via a crafted file with a Javascript payload in the file name.
References
Configurations
History
21 Nov 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js - Third Party Advisory | |
References | () http://hayageek.github.io/jQuery-Upload-File/4.0.11/jquery.uploadfile.min.js - Third Party Advisory | |
References | () http://hayageek.github.io/jQuery-Upload-File/4.0.11/uploadfile.css - Third Party Advisory | |
References | () http://haygeek.com - Broken Link | |
References | () http://jquery-upload-file.com - Broken Link, URL Repurposed | |
References | () https://github.com/hayageek/jquery-upload-file/blob/master/js/jquery.uploadfile.js#L469 - Third Party Advisory | |
References | () https://raw.githubusercontent.com/hayageek/jquery-upload-file/master/js/jquery.uploadfile.js - Third Party Advisory |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://jquery-upload-file.com - Broken Link, URL Repurposed |
Information
Published : 2022-02-25 19:15
Updated : 2024-11-21 06:15
NVD link : CVE-2021-37504
Mitre link : CVE-2021-37504
CVE.ORG link : CVE-2021-37504
JSON object : View
Products Affected
hayageek
- jquery_upload_file
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')