Description
This affects the package plupload before 2.3.9. A file name containing JavaScript code could be uploaded and run. An attacker would need to trick a user to upload this kind of file.
Remediation
References
https://github.com/moxiecode/plupload/blob/master/js/jquery.plupload.queue/jquery.plupload.queue.js%23L226
https://github.com/moxiecode/plupload/commit/d12175d4b5fa799b994ee1bb17bfbeec55b386fb
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2306665
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2306663
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMOXIECODE-2306664
https://snyk.io/vuln/SNYK-JS-PLUPLOAD-1583909
Related Vulnerabilities
CVE-2021-43090 Vulnerability in maven package com.predic8:soa-model-core
CVE-2023-37950 Vulnerability in maven package com.mabl.integration.jenkins:mabl-integration
CVE-2020-13942 Vulnerability in maven package org.apache.unomi:unomi-persistence-elasticsearch-core
CVE-2020-15130 Vulnerability in npm package slpjs
CVE-2019-20921 Vulnerability in maven package org.webjars.bower:bootstrap-select