A Cross-Site Script Inclusion vulnerability was found on LiquidFiles before 3.3.19. This client-side attack requires user interaction (opening a link) and successful exploitation could lead to encrypted e-mail content leakage via messages/sent?format=js and popup?format=js.
The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.
Link | Tags |
---|---|
https://lean0x2f.github.io/liquidfiles_advisory | third party advisory exploit |
https://man.liquidfiles.com/release_notes/version_3-3-x.html | release notes vendor advisory |