CVE-2023-48199

HTML Injection vulnerability in the 'manageApiKeys' component in Grocy <= 4.0.3 allows attackers to inject arbitrary HTML content without script execution. This occurs when user-supplied data is not appropriately sanitized, enabling the injection of HTML tags through parameter values. The attacker can then manipulate page content in the QR code detail popup, often coupled with social engineering tactics, exploiting both the trust of users and the application's lack of proper input handling.
Configurations

Configuration 1 (hide)

cpe:2.3:a:grocy_project:grocy:4.0.3:*:*:*:*:*:*:*

History

21 Nov 2024, 08:31

Type Values Removed Values Added
References () https://github.com/grocy/grocy - Product () https://github.com/grocy/grocy - Product
References () https://grocy.info - Product () https://grocy.info - Product
References () https://nitipoom-jar.github.io/CVE-2023-48199/ - Exploit, Third Party Advisory () https://nitipoom-jar.github.io/CVE-2023-48199/ - Exploit, Third Party Advisory

28 Nov 2023, 21:15

Type Values Removed Values Added
Summary An issue in Grocy v.4.0.3 allows a local attacker to execute arbitrary code and obtain sensitive information via the QR code funciton in the manageapikeys component. HTML Injection vulnerability in the 'manageApiKeys' component in Grocy <= 4.0.3 allows attackers to inject arbitrary HTML content without script execution. This occurs when user-supplied data is not appropriately sanitized, enabling the injection of HTML tags through parameter values. The attacker can then manipulate page content in the QR code detail popup, often coupled with social engineering tactics, exploiting both the trust of users and the application's lack of proper input handling.

21 Nov 2023, 01:03

Type Values Removed Values Added
CWE CWE-74
CPE cpe:2.3:a:grocy_project:grocy:4.0.3:*:*:*:*:*:*:*
First Time Grocy Project
Grocy Project grocy
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://nitipoom-jar.github.io/CVE-2023-48199/ - () https://nitipoom-jar.github.io/CVE-2023-48199/ - Exploit, Third Party Advisory
References () https://grocy.info - () https://grocy.info - Product
References () https://github.com/grocy/grocy - () https://github.com/grocy/grocy - Product

15 Nov 2023, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-15 23:15

Updated : 2024-11-21 08:31


NVD link : CVE-2023-48199

Mitre link : CVE-2023-48199

CVE.ORG link : CVE-2023-48199


JSON object : View

Products Affected

grocy_project

  • grocy
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')