Cross-site scripting in jQuery Upload File - CVE-2021-37504
Published: March 3, 2022
jQuery Upload File
Ravishanker Kusuma
Description
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in the fileNameStr parameter. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
External links
- https://raw.githubusercontent.com/hayageek/jquery-upload-file/master/js/jquery.uploadfile.js
- http://hayageek.github.io/jQuery-Upload-File/4.0.11/jquery.uploadfile.min.js
- http://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js
- http://hayageek.github.io/jQuery-Upload-File/4.0.11/uploadfile.css
- http://jquery-upload-file.com
- http://haygeek.com
- https://github.com/hayageek/jquery-upload-file/blob/master/js/jquery.uploadfile.js#L469