First published: Mon Nov 20 2023(Updated: )
Dev blog v1.0 allows to exploit an XSS through an unrestricted file upload, together with a bad entropy of filenames. With this an attacker can upload a malicious HTML file, then guess the filename of the uploaded file and send it to a potential victim.
Credit: help@fluidattacks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Armanidrisi Dev Blog | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-6142.
The title of the vulnerability is Dev Blog v1.0 - Stored XSS.
The vulnerability in Dev Blog v1.0 allows an attacker to exploit a stored XSS vulnerability through an unrestricted file upload and bad entropy of filenames. This allows the attacker to upload a malicious HTML file and guess the filename to send it to potential victims.
The software affected by this vulnerability is Armanidrisi Dev Blog version 1.0.
The severity of this vulnerability is medium with a CVSS score of 6.4.
The Common Weakness Enumeration (CWE) ID for this vulnerability is CWE-79.
You can find more information about this vulnerability in the following references: [Fluid Attacks Advisory](https://fluidattacks.com/advisories/bunny/) and [GitHub Repository](https://github.com/Armanidrisi/devblog/).