Lucene search

K
githubGitHub Advisory DatabaseGHSA-VV3R-FXQP-VR3F
HistoryNov 21, 2022 - 11:58 p.m.

XSS via uploaded gpx file

2022-11-2123:58:07
CWE-79
GitHub Advisory Database
github.com
37
xss
uploaded file
gpx
javascript payload
browser support
gps data
silverstripe cms

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

31.7%

A malicious content author could upload a GPX file with a Javascript payload. The payload could then be executed by luring a legitimate user to view the file in a browser with support for GPX files. GPX is an XML-based format used to store GPS data.

By default, Silverstripe CMS will no longer allow GPX files to be uploaded to the assets area.

Affected configurations

Vulners
Node
silverstripeassetsRange1.0.01.11.1
VendorProductVersionCPE
silverstripeassets*cpe:2.3:a:silverstripe:assets:*:*:*:*:*:*:*:*

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

31.7%