CVE-2022-30110

The file preview functionality in Jirafeau < 4.4.0, which is enabled by default, could be exploited for cross site scripting. An attacker could upload image/svg+xml files containing JavaScript. When someone visits the File Preview URL for this file, the JavaScript inside of this image/svg+xml file will be executed in the users' browser.
References
Link Resource
https://gitlab.com/mojo42/Jirafeau/-/merge_requests/103 Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:jirafeau:jirafeau:*:*:*:*:*:*:*:*

History

26 May 2022, 14:42

Type Values Removed Values Added
CWE CWE-79
CVSS v2 : unknown
v3 : unknown
v2 : 4.3
v3 : 6.1
References (MISC) https://gitlab.com/mojo42/Jirafeau/-/merge_requests/103 - (MISC) https://gitlab.com/mojo42/Jirafeau/-/merge_requests/103 - Patch, Third Party Advisory
CPE cpe:2.3:a:jirafeau:jirafeau:*:*:*:*:*:*:*:*

17 May 2022, 14:21

Type Values Removed Values Added
New CVE

Information

Published : 2022-05-17 14:15

Updated : 2024-02-04 22:29


NVD link : CVE-2022-30110

Mitre link : CVE-2022-30110

CVE.ORG link : CVE-2022-30110


JSON object : View

Products Affected

jirafeau

  • jirafeau
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')