Description
PDW File Browser version 1.3 contains stored and reflected cross-site scripting vulnerabilities that allow authenticated attackers to inject malicious scripts through file rename and path parameters. Attackers can craft malicious URLs or rename files with XSS payloads to execute arbitrary JavaScript in victims' browsers when they access the file browser.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
Credits
David Bimmel
References
www.exploit-db.com/exploits/48947 (ExploitDB-48947)
github.com/GuidoNeele/PDW-File-Browser (PDW File Browser GitHub Repository)
www.vulncheck.com/...w-file-browser-cross-site-scripting-xss (VulnCheck Advisory: PDW File Browser <= v1.3 - Cross-Site Scripting (XSS))