Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown

CVE-2023-4393

Disclosure Date: October 30, 2023 (last updated November 09, 2023)
HTML and SMTP injections on the registration page of LiquidFiles versions 3.7.13 and below, allow an attacker to perform more advanced phishing attacks against an organization.
Attacker Value
Unknown

CVE-2021-43397

Disclosure Date: November 11, 2021 (last updated October 07, 2023)
LiquidFiles before 3.6.3 allows remote attackers to elevate their privileges from Admin (or User Admin) to Sysadmin.
Attacker Value
Unknown

CVE-2021-30140

Disclosure Date: April 06, 2021 (last updated February 22, 2025)
LiquidFiles 3.4.15 has stored XSS through the "send email" functionality when sending a file via email to an administrator. When a file has no extension and contains malicious HTML / JavaScript content (such as SVG with HTML content), the payload is executed upon a click. This is fixed in 3.5.
Attacker Value
Unknown

CVE-2020-29072

Disclosure Date: November 25, 2020 (last updated February 22, 2025)
A Cross-Site Script Inclusion vulnerability was found on LiquidFiles before 3.3.19. This client-side attack requires user interaction (opening a link) and successful exploitation could lead to encrypted e-mail content leakage via messages/sent?format=js and popup?format=js.
Attacker Value
Unknown

CVE-2020-29071

Disclosure Date: November 25, 2020 (last updated February 22, 2025)
An XSS issue was found in the Shares feature of LiquidFiles before 3.3.19. The issue arises from the insecure rendering of HTML files uploaded to the platform as attachments, when the -htmlview URL is directly accessed. The impact ranges from executing commands as root on the server to retrieving sensitive information about encrypted e-mails, depending on the permissions of the target user.