This affects the package plupload before 2.3.9. A file name containing JavaScript code could be uploaded and run. An attacker would need to trick a user to upload this kind of file.
References
Link | Resource |
---|---|
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMOXIECODE-2306664 | Patch Third Party Advisory |
https://github.com/moxiecode/plupload/commit/d12175d4b5fa799b994ee1bb17bfbeec55b386fb | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2306665 | Patch Third Party Advisory |
https://github.com/moxiecode/plupload/blob/master/js/jquery.plupload.queue/jquery.plupload.queue.js%23L226 | Broken Link |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2306663 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-PLUPLOAD-1583909 | Patch Third Party Advisory |
Configurations
Information
Published : 2021-12-03 12:15
Updated : 2021-12-06 17:22
NVD link : CVE-2021-23562
Mitre link : CVE-2021-23562
JSON object : View
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
Products Affected
tiny
- plupload