HTML Injection vulnerability in the 'manageApiKeys' component in Grocy <= 4.0.3 allows attackers to inject arbitrary HTML content without script execution. This occurs when user-supplied data is not appropriately sanitized, enabling the injection of HTML tags through parameter values. The attacker can then manipulate page content in the QR code detail popup, often coupled with social engineering tactics, exploiting both the trust of users and the application's lack of proper input handling.
References
Link | Resource |
---|---|
https://github.com/grocy/grocy | Product |
https://grocy.info | Product |
https://nitipoom-jar.github.io/CVE-2023-48199/ | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-11-15 23:15
Updated : 2023-11-28 21:15
NVD link : CVE-2023-48199
Mitre link : CVE-2023-48199
CVE.ORG link : CVE-2023-48199
JSON object : View
Products Affected
grocy_project
- grocy
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')