CVE-2019-19733

_get_all_file_server_paths.ajax.php (aka get_all_file_server_paths.ajax.php) in MFScripts YetiShare 3.5.2 through 4.5.3 does not sanitize or encode the output from the fileIds parameter on the page, which would allow an attacker to input HTML or execute scripts on the site, aka XSS.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mfscripts:yetishare:*:*:*:*:*:*:*:*

History

07 Nov 2023, 03:07

Type Values Removed Values Added
References
  • {'url': 'https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459', 'name': 'https://medium.com/@jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459', 'tags': ['Exploit', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://medium.com/%40jra8908/yetishare-3-5-2-4-5-3-multiple-vulnerabilities-2d01d0cd7459 -

Information

Published : 2019-12-30 17:15

Updated : 2023-12-10 13:13


NVD link : CVE-2019-19733

Mitre link : CVE-2019-19733

CVE.ORG link : CVE-2019-19733


JSON object : View

Products Affected

mfscripts

  • yetishare
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')