Kiwi TCMS v12.2 comes with functionality that allows administrators to configure additional upload validator functions which give them more control over what file types are accepted for upload. By default `.exe` are denied. Other files containing the `<script>` tag, regardless of their type are also denied b/c they are a path to XSS attacks. There are no known workarounds aside from upgrading.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1299 | Unrestricted file upload in kiwi TCMS |
Github GHSA |
GHSA-fwcf-753v-fgcj | Unrestricted file upload in kiwi TCMS |
Tue, 04 Feb 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-04T18:45:16.191Z
Reserved: 2023-04-13T13:25:18.831Z
Link: CVE-2023-30613
Updated: 2024-08-02T14:28:51.910Z
Status : Analyzed
Published: 2023-04-24T17:15:10.863
Modified: 2025-04-11T14:50:37.970
Link: CVE-2023-30613
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA