Firefly III before 4.7.17.3 is vulnerable to stored XSS due to lack of filtration of user-supplied data in image file content. The JavaScript code is executed during attachments/view/$file_id$ attachment viewing. NOTE: It is asserted that an attacker must have the same access rights as the user in order to be able to execute the vulnerability
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-pcxq-28f6-m3fm | Firefly III vulnerable to image-based stored XSS |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:57:39.530Z
Reserved: 2019-07-17T00:00:00.000Z
Link: CVE-2019-13647
No data.
Status : Modified
Published: 2019-07-18T03:15:10.827
Modified: 2024-11-21T04:25:25.973
Link: CVE-2019-13647
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA