First published: Fri Oct 22 2021(Updated: )
Swift File Transfer Mobile v1.1.2 was discovered to contain a cross-site scripting (XSS) vulnerability via the devicename parameter which allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered as the device name itself.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Swiftfiletransfer Swift File Transfer | =1.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-36502 is a cross-site scripting (XSS) vulnerability in Swift File Transfer Mobile v1.1.2.
CVE-2020-36502 allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered as the device name in Swift File Transfer Mobile v1.1.2.
CVE-2020-36502 has a severity score of 6.1/10, which is classified as medium.
The vulnerability can be exploited by injecting malicious scripts or HTML code through the devicename parameter when entering the device name.
At the moment, there is no specific fix available for CVE-2020-36502. It is recommended to update to a patched version when it becomes available.