CVE-2023-46235
Summary
| CVE | CVE-2023-46235 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-10-31 15:15:00 UTC |
| Updated | 2023-11-08 17:38:00 UTC |
| Description | FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Prior to version 1.5.10.15, due to a lack of request sanitization in the logs, a malicious request containing XSS would be stored in a log file. When an administrator of the FOG server logged in and viewed the logs, they would be parsed as HTML and displayed accordingly. Version 1.5.10.15 contains a patch. As a workaround, view logs from an external text editor rather than the dashboard. |
Risk And Classification
Problem Types: CWE-79
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Fogproject | Fogproject | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Stored XSS on log screen via unsanitized request logging. · Advisory · FOGProject/fogproject · GitHub | MISC | github.com | |
| Implement log sanitization · FOGProject/fogproject@2e2421f · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.