A vulnerability, which was classified as problematic, has been found in Emlog Pro up to 2.4.1. Affected by this issue is some unknown functionality of the file /admin/link.php. The manipulation of the argument siteurl/icon leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/emlog/emlog/issues/307 | Exploit Issue Tracking |
https://vuldb.com/?ctiid.289082 | Permissions Required VDB Entry |
https://vuldb.com/?id.289082 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.462614 | Third Party Advisory VDB Entry |
Configurations
History
10 Jan 2025, 21:34
Type | Values Removed | Values Added |
---|---|---|
First Time |
Emlog emlog
Emlog |
|
CPE | cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:* | |
References | () https://github.com/emlog/emlog/issues/307 - Exploit, Issue Tracking | |
References | () https://vuldb.com/?ctiid.289082 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.289082 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.462614 - Third Party Advisory, VDB Entry |
21 Dec 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-21 05:15
Updated : 2025-01-10 21:34
NVD link : CVE-2024-12846
Mitre link : CVE-2024-12846
CVE.ORG link : CVE-2024-12846
JSON object : View
Products Affected
emlog
- emlog