XSS via uploaded gpx file
Moderate severity
GitHub Reviewed
Published
Nov 21, 2022
to the GitHub Advisory Database
•
Updated Feb 2, 2023
Description
Published to the GitHub Advisory Database
Nov 21, 2022
Reviewed
Nov 21, 2022
Published by the National Vulnerability Database
Nov 23, 2022
Last updated
Feb 2, 2023
A malicious content author could upload a GPX file with a Javascript payload. The payload could then be executed by luring a legitimate user to view the file in a browser with support for GPX files. GPX is an XML-based format used to store GPS data.
By default, Silverstripe CMS will no longer allow GPX files to be uploaded to the assets area.
References