In PageKit v1.0.18, a user can upload SVG files in the file upload portion of the CMS. These SVG files can contain malicious scripts. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to "/storage/exp.svg" that will point to http://localhost/pagekit/storage/exp.svg. When a user comes along to click that link, it will trigger a XSS attack.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-1362 In PageKit v1.0.18, a user can upload SVG files in the file upload portion of the CMS. These SVG files can contain malicious scripts. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to "/storage/exp.svg" that will point to http://localhost/pagekit/storage/exp.svg. When a user comes along to click that link, it will trigger a XSS attack.
Github GHSA Github GHSA GHSA-mrwr-2945-fr22 Cross-site scripting in PageKit
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T23:17:29.162Z

Reserved: 2021-05-07T00:00:00

Link: CVE-2021-32245

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-06-16T21:15:08.173

Modified: 2024-11-21T06:06:54.960

Link: CVE-2021-32245

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.