vendor:
PDW File Browser
by:
David Bimmel, Joost Vondeling, Ramòn Janssen
7.5
CVSS
HIGH
Cross-Site Scripting (XSS)
79
CWE
Product Name: PDW File Browser
Affected Version From: <=1.3
Affected Version To: <=1.3
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: N/A
2020
PDW File Browser <= v1.3 - Cross-Site Scripting (XSS)
The PDW File Browser is a plugin for the TinyMCE and CKEditor WYSIWYG editors. The PDW File Browser contains a stored and Reflected XSS vulnerability which results in code execution within the browser of an authenticated user. This vulnerability can be exploited when an authenticated user visits the crafted URL (i.e. when phished or when visiting a website containing the URL). Stored XSS is a result of insufficient input sanitization within the 'rename' functionality within the PDW file browser. Reflected XSS is a result of insufficient input sanitization of the 'path' parameter when fetching the file specifications (file_specs.php).
Mitigation:
Input validation and sanitization should be implemented to prevent XSS attacks.