A cross-site scripting (XSS) vulnerability in the fileNameStr parameter of jQuery-Upload-File v4.0.11 allows attackers to execute arbitrary web scripts or HTML via a crafted file with a Javascript payload in the file name.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js | third party advisory |
http://hayageek.github.io/jQuery-Upload-File/4.0.11/jquery.uploadfile.min.js | third party advisory |
http://hayageek.github.io/jQuery-Upload-File/4.0.11/uploadfile.css | third party advisory |
http://haygeek.com | broken link |
http://jquery-upload-file.com | url repurposed broken link |
https://github.com/hayageek/jquery-upload-file/blob/master/js/jquery.uploadfile.js#L469 | third party advisory |
https://raw.githubusercontent.com/hayageek/jquery-upload-file/master/js/jquery.uploadfile.js | third party advisory |