CVE-2021-30140
- Reference to the description:
- Description:
- LiquidFiles 3.4.15 has stored XSS through the "send email" functionality when sending a file via email to an administrator. When a file has no extension and contains malicious HTML / JavaScript content (such as SVG with HTML content), the payload is executed upon a click. This is fixed in 3.5.
- Last updated date:
- 09/30/2022
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 04/12/2021
- Reference url to background
https://gist.github.com/rodnt/9f7d368fac38cafa7334598ec94fb167
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 09/30/2022
- Reference url to background
http://packetstormsecurity.com/files/167228/LiquidFiles-3.4.15-Cross-Site-Scripting.html
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 09/30/2022
- Reference url to background