Vulnerability Description
A file upload functionality in Piranha CMS 11.1 allows authenticated remote attackers to upload a crafted PDF file to /manager/media. This PDF can contain malicious JavaScript code, which is executed when a victim user opens or interacts with the PDF in their web browser, leading to a XSS vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dotnetfoundation | Piranha Cms | 11.1 |
Related Weaknesses (CWE)
References
- https://github.com/PiranhaCMS/piranha.coreProduct
- https://sec-fortress.github.io/posts/articles/posts/CVE-2024-55342.htmlExploitThird Party Advisory
FAQ
What is CVE-2024-55342?
CVE-2024-55342 is a vulnerability with a CVSS score of 4.7 (MEDIUM). A file upload functionality in Piranha CMS 11.1 allows authenticated remote attackers to upload a crafted PDF file to /manager/media. This PDF can contain malicious JavaScript code, which is executed ...
How severe is CVE-2024-55342?
CVE-2024-55342 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-55342?
Check the references section above for vendor advisories and patch information. Affected products include: Dotnetfoundation Piranha Cms.