CVE-2024-29833

The image upload component allows SVG files and the regular expression used to remove script tags can be bypassed by using a Cross Site Scripting payload which does not match the regular expression; one example of this is the inclusion of whitespace within the script tag. An attacker must target an authenticated user with permissions to access this feature, however once uploaded the payload is also accessible to unauthenticated users.
Configurations

No configuration.

History

21 Nov 2024, 09:08

Type Values Removed Values Added
References () https://appcheck-ng.com/xss-vulnerabilities-discovered-10web-photogallery-wordpress-plugin/ - () https://appcheck-ng.com/xss-vulnerabilities-discovered-10web-photogallery-wordpress-plugin/ -
References () https://wordpress.org/plugins/photo-gallery/#developers - () https://wordpress.org/plugins/photo-gallery/#developers -

02 Aug 2024, 17:35

Type Values Removed Values Added
Summary
  • (es) El componente de carga de imágenes permite archivos SVG y la expresión regular utilizada para eliminar etiquetas de script se puede omitir mediante el uso de un payload de Cross Site Scripting que no coincide con la expresión regular; un ejemplo de esto es la inclusión de espacios en blanco dentro de la etiqueta del script. Un atacante debe apuntar a un usuario autenticado con permisos para acceder a esta función; sin embargo, una vez cargada, el payload también es accesible para usuarios no autenticados.

26 Mar 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-26 16:15

Updated : 2024-11-21 09:08


NVD link : CVE-2024-29833

Mitre link : CVE-2024-29833

CVE.ORG link : CVE-2024-29833


JSON object : View

Products Affected

No product.

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')