25 lines
855 B
JSON
Raw Normal View History

{
"id": "CVE-2023-26771",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-04T19:15:15.967",
"lastModified": "2024-10-04T19:15:15.967",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Taskcafe 0.3.2 is vulnerable to Cross Site Scripting (XSS). There is a lack of validation in the filetype when uploading a SVG profile picture with a XSS payload on it. An authenticated attacker can exploit this vulnerability by uploading a malicious picture which will trigger the payload when the victim opens the file."
}
],
"metrics": {},
"references": [
{
"url": "https://bishopfox.com/blog/taskcafe-version-0-3-2-advisory",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/JordanKnott/taskcafe",
"source": "cve@mitre.org"
}
]
}