The file preview functionality in Jirafeau < 4.4.0, which is enabled by default, could be exploited for cross site scripting. An attacker could upload image/svg+xml files containing JavaScript. When someone visits the File Preview URL for this file, the JavaScript inside of this image/svg+xml file will be executed in the users' browser.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://gitlab.com/mojo42/Jirafeau/-/merge_requests/103 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2022-05-17T13:14:17
Updated: 2024-08-03T06:40:47.582Z
Reserved: 2022-05-02T00:00:00
Link: CVE-2022-30110
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2022-05-17T14:15:08.053
Modified: 2022-05-26T14:42:32.783
Link: CVE-2022-30110
Redhat
No data.