CVE-2023-6551

As a simple library, class.upload.php does not perform an in-depth check on uploaded files, allowing a stored XSS vulnerability when the default configuration is used. Developers must be aware of that fact and use extension whitelisting accompanied by forcing the server to always provide content-type based on the file extension. The README has been updated to include these guidelines.
Configurations

Configuration 1 (hide)

cpe:2.3:a:verot:class.upload.php:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:44

Type Values Removed Values Added
References () https://cert.pl/en/posts/2024/01/CVE-2023-6551 - Third Party Advisory () https://cert.pl/en/posts/2024/01/CVE-2023-6551 - Third Party Advisory
References () https://cert.pl/posts/2024/01/CVE-2023-6551 - Third Party Advisory () https://cert.pl/posts/2024/01/CVE-2023-6551 - Third Party Advisory

10 Oct 2024, 16:15

Type Values Removed Values Added
CWE CWE-20
Summary (en) As a simple library, class.upload.php does not perform an in-depth check on uploaded files, allowing a stored XSS vulnerability when the default configuration is used. Developers must be aware of that fact and use extension whitelisting accompanied by forcing the server to always provide content-type based on the file extension. The README has been updated to include these guidelines. (en) As a simple library, class.upload.php does not perform an in-depth check on uploaded files, allowing a stored XSS vulnerability when the default configuration is used. Developers must be aware of that fact and use extension whitelisting accompanied by forcing the server to always provide content-type based on the file extension. The README has been updated to include these guidelines.

11 Jan 2024, 16:41

Type Values Removed Values Added
CPE cpe:2.3:a:verot:class.upload.php:-:*:*:*:*:*:*:*
References () https://cert.pl/en/posts/2024/01/CVE-2023-6551 - () https://cert.pl/en/posts/2024/01/CVE-2023-6551 - Third Party Advisory
References () https://cert.pl/posts/2024/01/CVE-2023-6551 - () https://cert.pl/posts/2024/01/CVE-2023-6551 - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
Summary
  • (es) Como librería simple, class.upload.php no realiza una verificación en profundidad de los archivos cargados, lo que permite una vulnerabilidad de XSS almacenado cuando se usa la configuración predeterminada. Los desarrolladores deben ser conscientes de este hecho y utilizar la lista blanca de extensiones, además de obligar al servidor a proporcionar siempre el tipo de contenido según la extensión del archivo. El README se ha actualizado para incluir estas pautas.
CWE CWE-434
First Time Verot class.upload.php
Verot

04 Jan 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-04 16:15

Updated : 2025-06-03 15:15


NVD link : CVE-2023-6551

Mitre link : CVE-2023-6551

CVE.ORG link : CVE-2023-6551


JSON object : View

Products Affected

verot

  • class.upload.php
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type