mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 17:50:34 +00:00
21 lines
930 B
Markdown
21 lines
930 B
Markdown
![]() |
### [CVE-2019-19733](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19733)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
_get_all_file_server_paths.ajax.php (aka get_all_file_server_paths.ajax.php) in MFScripts YetiShare 3.5.2 through 4.5.3 does not sanitize or encode the output from the fileIds parameter on the page, which would allow an attacker to input HTML or execute scripts on the site, aka XSS.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xT11/CVE-POC
|
||
|
- https://github.com/developer3000S/PoC-in-GitHub
|
||
|
- https://github.com/hectorgie/PoC-in-GitHub
|
||
|
- https://github.com/jra89/CVE-2019-19733
|
||
|
|