In PageKit v1.0.18, a user can upload SVG files in the file upload portion of the CMS. These SVG files can contain malicious scripts. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to "/storage/exp.svg" that will point to http://localhost/pagekit/storage/exp.svg. When a user comes along to click that link, it will trigger a XSS attack.
References
Link | Resource |
---|---|
https://github.com/pagekit/pagekit/issues/963 | Exploit Issue Tracking Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-06-16T20:37:41
Updated: 2021-06-16T20:37:41
Reserved: 2021-05-07T00:00:00
Link: CVE-2021-32245
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-06-16T21:15:08.173
Modified: 2021-06-23T13:47:38.557
Link: CVE-2021-32245
JSON object: View
Redhat Information
No data.
CWE