Firefly III before 4.7.17.3 is vulnerable to stored XSS due to lack of filtration of user-supplied data in image file names. The JavaScript code is executed during attachments/edit/$file_id$ attachment editing. NOTE: It is asserted that an attacker must have the same access rights as the user in order to be able to execute the vulnerability
References
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2019-07-18T02:17:33

Updated: 2020-12-01T16:35:39

Reserved: 2019-07-17T00:00:00


Link: CVE-2019-13645

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2019-07-18T03:15:10.373

Modified: 2024-05-17T01:32:50.263


Link: CVE-2019-13645

JSON object: View

cve-icon Redhat Information

No data.

CWE