Script afGdStream.php in AdmirorFrames Joomla! extension doesn’t specify a content type and as a result default (text/html) is used. An attacker may embed HTML tags directly in image data which is rendered by a webpage as HTML. This issue affects AdmirorFrames: before 5.0.
References
Link | Resource |
---|---|
https://cert.pl/en/posts/2024/06/CVE-2024-5735/ | Third Party Advisory |
https://cert.pl/posts/2024/06/CVE-2024-5735/ | Third Party Advisory |
https://github.com/afine-com/CVE-2024-5737 | Exploit Third Party Advisory |
https://github.com/sectroyer/CVEs/tree/main/CVE-2024-5737 | Exploit Third Party Advisory |
https://github.com/vasiljevski/admirorframes/issues/3 | Issue Tracking |
Configurations
History
No history.
Information
Published : 2024-06-28 12:15
Updated : 2024-07-03 14:09
NVD link : CVE-2024-5737
Mitre link : CVE-2024-5737
CVE.ORG link : CVE-2024-5737
JSON object : View
Products Affected
admiror-design-studio
- admirorframes
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')