Firefly III before 4.7.17.3 is vulnerable to stored XSS due to lack of filtration of user-supplied data in image file names. The JavaScript code is executed during attachments/edit/$file_id$ attachment editing. NOTE: It is asserted that an attacker must have the same access rights as the user in order to be able to execute the vulnerability
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5hpw-vcj2-prwg | Firefly III vulnerable to stored XSS |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:57:39.527Z
Reserved: 2019-07-17T00:00:00.000Z
Link: CVE-2019-13645
No data.
Status : Modified
Published: 2019-07-18T03:15:10.373
Modified: 2024-11-21T04:25:25.687
Link: CVE-2019-13645
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA