An XSS issue was discovered in Serenity Serene (and StartSharp) before 6.7.0. When users upload temporary files, some specific file endings are not allowed, but it is possible to upload .html or .htm files containing an XSS payload. The resulting link can be sent to an administrator user.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html - | |
References | () http://seclists.org/fulldisclosure/2023/May/14 - | |
References | () https://github.com/serenity-is/Serenity/commit/11b9d267f840513d04b4f4d4876de7823a6e48d2 - Patch, Vendor Advisory |
30 May 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
30 May 2023, 06:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2023-04-27 03:15
Updated : 2024-11-21 08:01
NVD link : CVE-2023-31285
Mitre link : CVE-2023-31285
CVE.ORG link : CVE-2023-31285
JSON object : View
Products Affected
serenity
- serene
- startsharp
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')