CVE-2023-3784

A vulnerability was found in Dooblou WiFi File Explorer 1.13.3. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument search/order/download/mode leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235051.
References
Link Resource
https://seclists.org/fulldisclosure/2023/Jul/37 Exploit Mailing List Third Party Advisory
https://vuldb.com/?ctiid.235051 Third Party Advisory
https://vuldb.com/?id.235051 Third Party Advisory
https://www.vulnerability-lab.com/get_content.php?id=2317 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:wifi_file_explorer_project:wifi_file_explorer:1.13.3:*:*:*:*:android:*:*

History

28 Jul 2023, 15:52

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
First Time Wifi File Explorer Project
Wifi File Explorer Project wifi File Explorer
CPE cpe:2.3:a:wifi_file_explorer_project:wifi_file_explorer:1.13.3:*:*:*:*:android:*:*
References (MISC) https://www.vulnerability-lab.com/get_content.php?id=2317 - (MISC) https://www.vulnerability-lab.com/get_content.php?id=2317 - Exploit, Third Party Advisory
References (MISC) https://vuldb.com/?id.235051 - (MISC) https://vuldb.com/?id.235051 - Third Party Advisory
References (MISC) https://vuldb.com/?ctiid.235051 - (MISC) https://vuldb.com/?ctiid.235051 - Third Party Advisory
References (MISC) https://seclists.org/fulldisclosure/2023/Jul/37 - (MISC) https://seclists.org/fulldisclosure/2023/Jul/37 - Exploit, Mailing List, Third Party Advisory

20 Jul 2023, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-20 09:15

Updated : 2024-05-17 02:27


NVD link : CVE-2023-3784

Mitre link : CVE-2023-3784

CVE.ORG link : CVE-2023-3784


JSON object : View

Products Affected

wifi_file_explorer_project

  • wifi_file_explorer
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')