** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in vova07 Yii2 FileAPI Widget up to 0.1.8. It has been declared as problematic. Affected by this vulnerability is the function run of the file actions/UploadAction.php. The manipulation of the argument file leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.1.9 is able to address this issue. The identifier of the patch is c00d1e4fc912257fca1fce66d7a163bdbb4c8222. It is recommended to upgrade the affected component. The identifier VDB-217141 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link | Resource |
---|---|
https://github.com/vova07/yii2-fileapi-widget/commit/c00d1e4fc912257fca1fce66d7a163bdbb4c8222 | Patch |
https://github.com/vova07/yii2-fileapi-widget/releases/tag/0.1.9 | Release Notes |
https://vuldb.com/?ctiid.217141 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.217141 | Permissions Required Third Party Advisory |
Configurations
History
22 Dec 2023, 21:33
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-31 11:15
Updated : 2024-08-05 22:15
NVD link : CVE-2017-20158
Mitre link : CVE-2017-20158
CVE.ORG link : CVE-2017-20158
JSON object : View
Products Affected
yii2_fileapi_widget_project
- yii2_fileapi_widget
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')