Safety vulnerability ID: 59485
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Affected versions of Kiwi TCMS prior to 12.2 are vulnerable to unrestricted file uploads. Malicious actors may upload .exe files or files containing embedded JavaScript, potentially causing browsers to execute malicious code when clicked. The attack vector relies on tricking users into interacting with these files via the attachment upload functionality for test plans and test cases. There are no known workarounds aside from upgrading. Mitigation is achieved by upgrading to v12.2, which includes configurable upload validator functions that deny .exe files and any files containing the <script> tag.
Latest version: 12.4
Test Case Management System
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application