mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
36 lines
1.1 KiB
JSON
36 lines
1.1 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2023-6551",
|
||
|
"sourceIdentifier": "cvd@cert.pl",
|
||
|
"published": "2024-01-04T16:15:09.380",
|
||
|
"lastModified": "2024-01-04T16:15:09.380",
|
||
|
"vulnStatus": "Received",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "As a simple library, class.upload.php does not perform an in-depth check on uploaded files, allowing a stored XSS vulnerability when the default configuration is used. \n\n\nDevelopers must be aware of that fact and use extension whitelisting accompanied by forcing the server to always provide content-type based on the file extension. \n\n\nThe README has been updated to include these guidelines.\n\n\n"
|
||
|
}
|
||
|
],
|
||
|
"metrics": {},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "cvd@cert.pl",
|
||
|
"type": "Secondary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-20"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://cert.pl/en/posts/2024/01/CVE-2023-6551",
|
||
|
"source": "cvd@cert.pl"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://cert.pl/posts/2024/01/CVE-2023-6551",
|
||
|
"source": "cvd@cert.pl"
|
||
|
}
|
||
|
]
|
||
|
}
|