The file preview functionality in Jirafeau < 4.4.0, which is enabled by default, could be exploited for cross site scripting. An attacker could upload image/svg+xml files containing JavaScript. When someone visits the File Preview URL for this file, the JavaScript inside of this image/svg+xml file will be executed in the users' browser.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-4263 The file preview functionality in Jirafeau < 4.4.0, which is enabled by default, could be exploited for cross site scripting. An attacker could upload image/svg+xml files containing JavaScript. When someone visits the File Preview URL for this file, the JavaScript inside of this image/svg+xml file will be executed in the users' browser.
Github GHSA Github GHSA GHSA-j2xf-p274-g8cc Cross-site Scripting in Jirafeau
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T06:40:47.582Z

Reserved: 2022-05-02T00:00:00

Link: CVE-2022-30110

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-17T14:15:08.053

Modified: 2024-11-21T07:02:10.903

Link: CVE-2022-30110

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses