** DISPUTED ** Firefly III before 4.7.17.3 is vulnerable to stored XSS due to lack of filtration of user-supplied data in image file names. The JavaScript code is executed during attachments/edit/$file_id$ attachment editing. NOTE: It is asserted that an attacker must have the same access rights as the user in order to be able to execute the vulnerability.
References
Link | Resource |
---|---|
https://github.com/firefly-iii/firefly-iii/compare/a70b7cc...7d482aa | Patch Third Party Advisory |
https://github.com/firefly-iii/firefly-iii/issues/2337 | Exploit Third Party Advisory |
Configurations
Information
Published : 2019-07-17 20:15
Updated : 2020-12-01 09:15
NVD link : CVE-2019-13645
Mitre link : CVE-2019-13645
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
firefly-iii
- firefly_iii