An arbitrary file upload vulnerability in the file upload module of Tiddlywiki5 v5.2.2 allows attackers to execute arbitrary code via a crafted SVG file. Note: The vendor argues that this is not a legitimate issue and there is no vulnerability here.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://github.com/jimcola99/corruptsvgfile | third party advisory |
http://tiddlywiki5.com | broken link url repurposed product |
https://github.com/Jermolene/TiddlyWiki5 | third party advisory |
https://www.youtube.com/watch?v=F_DBx4psWns | third party advisory exploit |