We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-12844

Emlog Pro store.php cross site scripting



Description

EN DE

A vulnerability classified as problematic has been found in Emlog Pro up to 2.4.1. Affected is an unknown function of the file /admin/store.php. The manipulation of the argument tag leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

Es wurde eine problematische Schwachstelle in Emlog Pro bis 2.4.1 entdeckt. Es betrifft eine unbekannte Funktion der Datei /admin/store.php. Dank der Manipulation des Arguments tag mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.

Reserved 2024-12-20 | Published 2024-12-20 | Updated 2024-12-27 | Assigner VulDB


MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
MEDIUM: 4.3CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
5.0AV:N/AC:L/Au:N/C:N/I:P/A:N

Problem types

Cross Site Scripting

Code Injection

Timeline

2024-12-20:Advisory disclosed
2024-12-20:VulDB entry created
2024-12-20:VulDB entry last update

Credits

jiashenghe (VulDB User) reporter

References

vuldb.com/?id.289080 (VDB-289080 | Emlog Pro store.php cross site scripting) vdb-entry technical-description

vuldb.com/?ctiid.289080 (VDB-289080 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.462465 (Submit #462465 | emlog emlog pro 2.4.1 Cross-Site Scripting (XSS)) third-party-advisory

github.com/emlog/emlog/issues/305 exploit issue-tracking

cve.org (CVE-2024-12844)

nvd.nist.gov (CVE-2024-12844)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-12844

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.