In Bolt CMS before version 3.7.1, the filename of uploaded files was vulnerable to stored XSS. It is not possible to inject javascript code in the file name when creating/uploading the file. But, once created/uploaded, it can be renamed to inject the payload in it. Additionally, the measures to prevent renaming the file to disallowed filename extensions could be circumvented. This is fixed in Bolt 3.7.1.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/bolt/bolt/pull/7853 | third party advisory patch |
https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f | third party advisory patch |
https://github.com/bolt/bolt/security/advisories/GHSA-68q3-7wjp-7q3j | third party advisory patch |
http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-Upload.html | third party advisory vdb entry exploit |
http://seclists.org/fulldisclosure/2020/Jul/4 | mailing list third party advisory exploit |