This affects the package plupload before 2.3.9. A file name containing JavaScript code could be uploaded and run. An attacker would need to trick a user to upload this kind of file.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 05:51
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/moxiecode/plupload/blob/master/js/jquery.plupload.queue/jquery.plupload.queue.js%23L226 - Broken Link | |
| References | () https://github.com/moxiecode/plupload/commit/d12175d4b5fa799b994ee1bb17bfbeec55b386fb - Patch, Third Party Advisory | |
| References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2306665 - Patch, Third Party Advisory | |
| References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2306663 - Patch, Third Party Advisory | |
| References | () https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMOXIECODE-2306664 - Patch, Third Party Advisory | |
| References | () https://snyk.io/vuln/SNYK-JS-PLUPLOAD-1583909 - Patch, Third Party Advisory | |
| CVSS | v2 : v3 : | v2 : 6.8 v3 : 4.2 | 
Information
                Published : 2021-12-03 20:15
Updated : 2024-11-21 05:51
NVD link : CVE-2021-23562
Mitre link : CVE-2021-23562
CVE.ORG link : CVE-2021-23562
JSON object : View
Products Affected
                tiny
- plupload
CWE
                
                    
                        
                        CWE-434
                        
            Unrestricted Upload of File with Dangerous Type
