[go: up one dir, main page]

Skip to content

Stored-XSS vulnerability

Reported by Yann CAM (ycam) by mail:

Jirafeau once was affected by CVE-2022-30110. The fix provided back then checks for MIME type image/svg+xml. But this check can be bypassed by manipulating the request header to contain MIME type image/svg+XML.

ycam also provided a fix. All we have to do is to replace strpos() in line 562 of functions.php with stripos(), so that it looks like this:

if (in_array($decomposed[0], $viewable) && stripos($mime, 'image/svg+xml') === false) {

I will include this fix in 4.6.1 and report a CVE.

Edited by Patrick Canterino