Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fvhw-w3qc-hw2r

Опубликовано: 02 сент. 2024
Источник: github
Github: Не прошло ревью
CVSS4: 5.3
CVSS3: 3.5

Описание

A vulnerability classified as problematic was found in Grocy up to 4.2.0. This vulnerability affects unknown code of the file /api/files/recipepictures/ of the component SVG File Upload Handler. The manipulation of the argument force_serve_as with the input picture' leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. NOTE: The project maintainer explains that "this is 'nonsense' and practically irrelevant according to the project's security policy" which expects additional authentication for the software.

A vulnerability classified as problematic was found in Grocy up to 4.2.0. This vulnerability affects unknown code of the file /api/files/recipepictures/ of the component SVG File Upload Handler. The manipulation of the argument force_serve_as with the input picture' leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. NOTE: The project maintainer explains that "this is 'nonsense' and practically irrelevant according to the project's security policy" which expects additional authentication for the software.

EPSS

Процентиль: 22%
0.00073
Низкий

5.3 Medium

CVSS4

3.5 Low

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 3.5
nvd
больше 1 года назад

A vulnerability classified as problematic was found in Grocy up to 4.2.0. This vulnerability affects unknown code of the file /api/files/recipepictures/ of the component SVG File Upload Handler. The manipulation of the argument force_serve_as with the input picture' leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. Unfortunately, the project maintainer does not want to be quoted in any way regarding the dispute rationale. The security policy of the project implies that this finding is "practically irrelevant" due to authentication requirements.

EPSS

Процентиль: 22%
0.00073
Низкий

5.3 Medium

CVSS4

3.5 Low

CVSS3

Дефекты

CWE-79