2 results (0.010 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

I, Librarian is an open-source version of a PDF managing SaaS. Supplemental Files are allowed to be viewed in the browser, only if they have a white-listed MIME type. Unfortunately, this logic is broken, thus allowing unsafe files containing Javascript to be executed with the application context. An attacker can exploit this vulnerability by uploading a supplementary file that contains a malicious code or script. This code will then be executed when the file is loaded in the browser. • https://github.com/mkucej/i-librarian-free/commit/a67d7949ffb02fd912ebdcf552df006b44066d78 https://github.com/mkucej/i-librarian-free/security/advisories/GHSA-c2rm-w62w-5xmj • CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

I, Librarian is an open-source version of a PDF managing SaaS. PDF notes are displayed on the Item Summary page without any form of validation or sanitation. An attacker can exploit this vulnerability by inserting a payload in the PDF notes that contains malicious code or script. This code will then be executed when the page is loaded in the browser. The vulnerability was fixed in version 5.11.1. • https://github.com/mkucej/i-librarian-free/commit/b4570103d21fc4fdd2483689aafc6028d9f6a76d https://github.com/mkucej/i-librarian-free/security/advisories/GHSA-h5hx-fm7f-2xmx • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •