Files
CVEs-PoC/2021/CVE-2021-24563.md
T
2024-06-18 02:51:15 +02:00

25 lines
1.2 KiB
Markdown

### [CVE-2021-24563](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24563)
![](https://img.shields.io/static/v1?label=Product&message=Frontend%20Uploader&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.3.2%3C%3D%201.3.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Frontend Uploader WordPress plugin through 1.3.2 does not prevent HTML files from being uploaded via its form, allowing unauthenticated user to upload a malicious HTML file containing JavaScript for example, which will be triggered when someone access the file directly
### POC
#### Reference
- http://packetstormsecurity.com/files/165515/WordPress-Frontend-Uploader-1.3.2-Cross-Site-Scripting.html
- https://wpscan.com/vulnerability/e53ef41e-a176-4d00-916a-3a03835370f1
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/V35HR4J/CVE-2021-24563
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/whoforget/CVE-POC
- https://github.com/youwizard/CVE-POC