_get_all_file_server_paths.ajax.php (aka get_all_file_server_paths.ajax.php) in MFScripts YetiShare 3.5.2 through 4.5.3 does not sanitize or encode the output from the fileIds parameter on the page, which would allow an attacker to input HTML or execute scripts on the site, aka XSS.
References
Link | Resource |
---|---|
https://github.com/jra89/CVE-2019-19733 | Exploit Third Party Advisory |
https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 | Exploit Third Party Advisory |
Configurations
Information
Published : 2019-12-30 09:15
Updated : 2020-01-07 06:13
NVD link : CVE-2019-19733
Mitre link : CVE-2019-19733
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
mfscripts
- yetishare