First published: Wed Nov 15 2023(Updated: )
HTML Injection vulnerability in the 'manageApiKeys' component in Grocy <= 4.0.3 allows attackers to inject arbitrary HTML content without script execution. This occurs when user-supplied data is not appropriately sanitized, enabling the injection of HTML tags through parameter values. The attacker can then manipulate page content in the QR code detail popup, often coupled with social engineering tactics, exploiting both the trust of users and the application's lack of proper input handling.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Grocy Project Grocy | =4.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-48199 is high, with a severity score of 7.8.
CVE-2023-48199 affects Grocy version 4.0.3.
A local attacker can exploit CVE-2023-48199 by executing arbitrary code and obtaining sensitive information via the QR code function in the manageapikeys component of Grocy version 4.0.3.
To fix CVE-2023-48199, it is recommended to upgrade Grocy to a version that has addressed the vulnerability.
More information about CVE-2023-48199 can be found at the following references: [Grocy GitHub](https://github.com/grocy/grocy), [Grocy Website](https://grocy.info), [CVE-2023-48199 Details](https://nitipoom-jar.github.io/CVE-2023-48199/).