We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-46235

FOG stored XSS on log screen via unsanitized request logging



AssignerGitHub_M
Reserved2023-10-19
Published2023-10-31
Updated2024-09-05

Description

FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Prior to version 1.5.10.15, due to a lack of request sanitization in the logs, a malicious request containing XSS would be stored in a log file. When an administrator of the FOG server logged in and viewed the logs, they would be parsed as HTML and displayed accordingly. Version 1.5.10.15 contains a patch. As a workaround, view logs from an external text editor rather than the dashboard.



MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)

Product status

< 1.5.10.15
affected

References

https://github.com/FOGProject/fogproject/security/advisories/GHSA-cvf7-7mvq-5694

https://github.com/FOGProject/fogproject/commit/2e2421f19620669b9930f72fb73a8dbc5efe4980

cve.org CVE-2023-46235

nvd.nist.gov CVE-2023-46235

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-46235
Subscribe to our newsletter to learn more about our work.