CVE-2023-48199
Product detail ⌗
HTML Injection vulnerability in the 'manageApiKeys' component in Grocy <= 4.0.3 allows attackers to inject arbitrary HTML content without script execution. This occurs when user-supplied data is not appropriately sanitized, enabling the injection of HTML tags through parameter values. The attacker can then manipulate page content in the QR code detail popup, often coupled with social engineering tactics, exploiting both the trust of users and the application's lack of proper input handling.
Prerequisite ⌗
Install Grocy from official Grocy Github repository
GitHub page
Grocy version 4.0.3 released on Sep 2
Installation on Portainer Docker
Installed Grocy version 4.0.3
Exploitation ⌗
1. Go to Manage API keys page
2. Add new API key
3. Insert malicious HTML code in the description
Normal API description:
Malicious description
HTML code which is GET method input form is injected into HTML element.