This affects the package plupload before 2.3.9. A file name containing JavaScript code could be uploaded and run. An attacker would need to trick a user to upload this kind of file.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://snyk.io/vuln/SNYK-JS-PLUPLOAD-1583909 | third party advisory patch |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2306663 | third party advisory patch |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMOXIECODE-2306664 | third party advisory patch |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2306665 | third party advisory patch |
https://github.com/moxiecode/plupload/blob/master/js/jquery.plupload.queue/jquery.plupload.queue.js%23L226 | broken link |
https://github.com/moxiecode/plupload/commit/d12175d4b5fa799b994ee1bb17bfbeec55b386fb | third party advisory patch |