A cross-site scripting (XSS) vulnerability in the fileNameStr parameter of jQuery-Upload-File v4.0.11 allows attackers to execute arbitrary web scripts or HTML via a crafted file with a Javascript payload in the file name.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-0802 | A cross-site scripting (XSS) vulnerability in the fileNameStr parameter of jQuery-Upload-File v4.0.11 allows attackers to execute arbitrary web scripts or HTML via a crafted file with a Javascript payload in the file name. |
Github GHSA |
GHSA-43x9-7hfv-mxrf | jQuery-Upload-File XSS in fileNameStr |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T01:22:59.369Z
Reserved: 2021-07-26T00:00:00
Link: CVE-2021-37504
No data.
Status : Modified
Published: 2022-02-25T19:15:12.030
Modified: 2024-11-21T06:15:17.693
Link: CVE-2021-37504
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA