CVE-2023-48199

HTML Injection vulnerability in the 'manageApiKeys' component in Grocy <= 4.0.3 allows attackers to inject arbitrary HTML content without script execution. This occurs when user-supplied data is not appropriately sanitized, enabling the injection of HTML tags through parameter values. The attacker can then manipulate page content in the QR code detail popup, often coupled with social engineering tactics, exploiting both the trust of users and the application's lack of proper input handling.
References
Link Resource
https://github.com/grocy/grocy Product
https://grocy.info Product
https://nitipoom-jar.github.io/CVE-2023-48199/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:grocy_project:grocy:4.0.3:*:*:*:*:*:*:*

History

28 Nov 2023, 21:15

Type Values Removed Values Added
Summary An issue in Grocy v.4.0.3 allows a local attacker to execute arbitrary code and obtain sensitive information via the QR code funciton in the manageapikeys component. HTML Injection vulnerability in the 'manageApiKeys' component in Grocy <= 4.0.3 allows attackers to inject arbitrary HTML content without script execution. This occurs when user-supplied data is not appropriately sanitized, enabling the injection of HTML tags through parameter values. The attacker can then manipulate page content in the QR code detail popup, often coupled with social engineering tactics, exploiting both the trust of users and the application's lack of proper input handling.

21 Nov 2023, 01:03

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-15 23:15

Updated : 2024-02-05 00:22


NVD link : CVE-2023-48199

Mitre link : CVE-2023-48199

CVE.ORG link : CVE-2023-48199


JSON object : View

Products Affected

grocy_project

  • grocy
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')