{"api_version":"1","generated_at":"2026-04-23T02:37:25+00:00","cve":"CVE-2023-46235","urls":{"html":"https://cve.report/CVE-2023-46235","api":"https://cve.report/api/cve/CVE-2023-46235.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-46235","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-46235"},"summary":{"title":"CVE-2023-46235","description":"FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Prior to version 1.5.10.15, due to a lack of request sanitization in the logs, a malicious request containing XSS would be stored in a log file. When an administrator of the FOG server logged in and viewed the logs, they would be parsed as HTML and displayed accordingly. Version 1.5.10.15 contains a patch. As a workaround, view logs from an external text editor rather than the dashboard.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-10-31 15:15:00","updated_at":"2023-11-08 17:38:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://github.com/FOGProject/fogproject/security/advisories/GHSA-cvf7-7mvq-5694","name":"https://github.com/FOGProject/fogproject/security/advisories/GHSA-cvf7-7mvq-5694","refsource":"MISC","tags":[],"title":"Stored XSS on log screen via unsanitized request logging. · Advisory · FOGProject/fogproject · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/FOGProject/fogproject/commit/2e2421f19620669b9930f72fb73a8dbc5efe4980","name":"https://github.com/FOGProject/fogproject/commit/2e2421f19620669b9930f72fb73a8dbc5efe4980","refsource":"MISC","tags":[],"title":"Implement log sanitization · FOGProject/fogproject@2e2421f · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-46235","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-46235","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"46235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"fogproject","cpe5":"fogproject","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-46235","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Prior to version 1.5.10.15, due to a lack of request sanitization in the logs, a malicious request containing XSS would be stored in a log file. When an administrator of the FOG server logged in and viewed the logs, they would be parsed as HTML and displayed accordingly. Version 1.5.10.15 contains a patch. As a workaround, view logs from an external text editor rather than the dashboard."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","cweId":"CWE-79"}]},{"description":[{"lang":"eng","value":"CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)","cweId":"CWE-80"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"FOGProject","product":{"product_data":[{"product_name":"fogproject","version":{"version_data":[{"version_affected":"=","version_value":"< 1.5.10.15"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/FOGProject/fogproject/security/advisories/GHSA-cvf7-7mvq-5694","refsource":"MISC","name":"https://github.com/FOGProject/fogproject/security/advisories/GHSA-cvf7-7mvq-5694"},{"url":"https://github.com/FOGProject/fogproject/commit/2e2421f19620669b9930f72fb73a8dbc5efe4980","refsource":"MISC","name":"https://github.com/FOGProject/fogproject/commit/2e2421f19620669b9930f72fb73a8dbc5efe4980"}]},"source":{"advisory":"GHSA-cvf7-7mvq-5694","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-10-31 15:15:00","lastModifiedDate":"2023-11-08 17:38:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.7}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:fogproject:fogproject:*:*:*:*:*:*:*:*","versionEndExcluding":"1.5.10.15","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}