The file content filtering in upload.php is not comprehensive. Adding comments or jpg and other file header information in the file content can lead to the successful upload of files such as xla, pages, gzip, etc. that contain HTML code. If an attacker adds malicious js scripts to the HTML code, it may trigger cross-site scripting (XSS) vulnerabilities and threaten user information.
Repair suggestion: Filter sensitive characters in uploaded files, such as <script>, etc.
The text was updated successfully, but these errors were encountered:
This requires priv escalation, its not guest uploads, so threat is low. An attacker with admin pass and hash already would have full access to everything..
Affected version : GetSimpleCMS before 3.3.16.
Vulnerable file : /admin/upload.php.
Vulnerability type : Cross Site Scripting(XSS)
The file content filtering in upload.php is not comprehensive. Adding comments or jpg and other file header information in the file content can lead to the successful upload of files such as xla, pages, gzip, etc. that contain HTML code. If an attacker adds malicious js scripts to the HTML code, it may trigger cross-site scripting (XSS) vulnerabilities and threaten user information.




Repair suggestion: Filter sensitive characters in uploaded files, such as <script>, etc.
The text was updated successfully, but these errors were encountered: