Safety vulnerability ID: 43737
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Plone.namedfile 5.5.0 prevents stored XSS from file upload (svg, html) by implementing an allowlist of trusted mimetypes.
https://github.com/plone/plone.namedfile/commit/37b9b7f29b0f804df622db9502abae28f3eccf38
https://plone.org/security/hotfix/20210518/reflected-xss-in-various-spots
Latest version: 5.5.1
File types and fields for images, files and blob files with filenames
------------------
New features:
- Prevent stored XSS from file upload (svg, html).
Do this by implementing an allowlist of trusted mimetypes.
You can turn this around by using a denylist of just svg, html and javascript.
Do this by setting OS environment variable ``NAMEDFILE_USE_DENYLIST=1``.
From `Products.PloneHotfix20210518 <https://plone.org/security/hotfix/20210518/reflected-xss-in-various-spots>`_.
[maurits] (3274)
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application