The file preview functionality in Jirafeau < 4.4.0, which is enabled by default, could be exploited for cross site scripting. An attacker could upload image/svg+xml files containing JavaScript. When someone visits the File Preview URL for this file, the JavaScript inside of this image/svg+xml file will be executed in the users' browser.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://gitlab.com/mojo42/Jirafeau/-/merge_requests/103 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published: 2022-05-17T13:14:17
Updated: 2024-08-03T06:40:47.582Z
Reserved: 2022-05-02T00:00:00
Link: CVE-2022-30110

No data.

Status : Modified
Published: 2022-05-17T14:15:08.053
Modified: 2024-11-21T07:02:10.903
Link: CVE-2022-30110

No data.