Withdrawn: Code execution via SVG file upload in tiddlywiki
Critical severity
GitHub Reviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated May 17, 2024
Withdrawn
This advisory was withdrawn on May 17, 2024
Description
Published by the National Vulnerability Database
May 16, 2022
Published to the GitHub Advisory Database
May 17, 2022
Reviewed
May 25, 2022
Withdrawn
May 17, 2024
Last updated
May 17, 2024
Withdrawn Advisory
This advisory has been withdrawn because it has been found to not be valid. Please see the issue here for more information.
Original Description
An arbitrary file upload vulnerability in the file upload module of Tiddlywiki5 v5.2.2 allows attackers to execute arbitrary code via a crafted SVG file.
References