- Description
- A file upload functionality in Piranha CMS 11.1 allows authenticated remote attackers to upload a crafted PDF file to /manager/media. This PDF can contain malicious JavaScript code, which is executed when a victim user opens or interacts with the PDF in their web browser, leading to a XSS vulnerability.
- Source
- cve@mitre.org
- NVD status
- Received
CVSS 3.1
- Type
- Secondary
- Base score
- 4.7
- Impact score
- 1.4
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
- Severity
- MEDIUM
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-79
- Hype score
- Not currently trending
CVE-2024-55342 Authenticated File Upload Leads to XSS in Piranha CMS 11.1 In Piranha CMS 11.1, there's a problem with the file upload feature. Authenticated attackers can upload a tricky PDF file to /manager/medi... https://t.co/7TQC7BqXfp
@VulmonFeeds
20 Dec 2024
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-55342 A file upload functionality in Piranha CMS 11.1 allows authenticated remote attackers to upload a crafted PDF file to /manager/media. This PDF can contain malicious J… https://t.co/r2ShUO6WPv
@CVEnew
20 Dec 2024
320 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes