Headline
CVE-2023-30338: XSS vulnerabilities in pro2.0.3 · Issue #229 · emlog/emlog
Multiple stored cross-site scripting (XSS) vulnerabilities in Emlog Pro v2.0.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Article Title or Article Summary parameters.
Version(latest version)
emlog_pro_2.0.3
Actual behavior
XSS vulnerabilities
Steps to reproduce the behavior
1.There is a stored xss in the article writing. The article body(文章正文) and article summary(文章摘要) has the vulnerability.
在写文章功能点,文章正文以及文章摘要处存在存储型xss
Go to the home page, the xss payload in article summary will be triggered first.
访问emlog首页,会先触发文章摘要中的xss
And after click the article, the xss in article body will be triggered.
之后点击该文章,会触发文章正文的xss
- The vulnerability is in resources --> add resource classification, the classification name has the xss.
在资源–>添加资源分类中,分类名称存在xss漏洞
After add a new resource classification, upload a file at will, then the vulnerability will be triggered, and it works when reloading the /admin/media.php page
在新创建的资源分类下,上传任意图片,即可触发xss,并且重新加载/admin/media.php页面时也会触发xss
3.And there is also a xss in home page bottom information.
在首页底部信息处存在存储性xss
Save the settings, and go to home page.
保存设置后,访问主页,触发xss