Open Upload through 0.4.3 allows XSS via index.php?action=u and the filename field.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/jenaye/cve/blob/master/readme.MD | third party advisory exploit |
https://sourceforge.net/p/openupload/openupload-code/commit_browser | third party advisory |
https://sourceforge.net/p/openupload/news/ | third party advisory |