Description
A cross-site scripting (XSS) vulnerability in the fileNameStr parameter of jQuery-Upload-File v4.0.11 allows attackers to execute arbitrary web scripts or HTML via a crafted file with a Javascript payload in the file name.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-0802 | A cross-site scripting (XSS) vulnerability in the fileNameStr parameter of jQuery-Upload-File v4.0.11 allows attackers to execute arbitrary web scripts or HTML via a crafted file with a Javascript payload in the file name. |
Github GHSA |
GHSA-43x9-7hfv-mxrf | jQuery-Upload-File XSS in fileNameStr |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T01:22:59.369Z
Reserved: 2021-07-26T00:00:00.000Z
Link: CVE-2021-37504
No data.
Status : Modified
Published: 2022-02-25T19:15:12.030
Modified: 2024-11-21T06:15:17.693
Link: CVE-2021-37504
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA