Dev Blog v1.0 - Stored XSS
6,4
Medium
Discovered by

Offensive Team, Fluid Attacks
Summary
Full name
Dev Blog v1.0 - Stored cross site scripting
Code name
State
Public
Release date
10 abr 2023
Affected product
Dev Blog
Affected version(s)
v1.0
Vulnerability name
Stored cross-site scripting (Stored XSS)
Vulnerability type
Remotely exploitable
Yes
CVSS v3.1 vector string
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L
CVSS v3.1 base score
6.4
Exploit available
Yes
CVE ID(s)
Description
Dev blog v1.0 allows to exploit an XSS through an unrestricted file upload, together with a bad entropy of filenames. With this an attacker can upload a malicious HTML file, then guess the filename of the uploaded file and send it to a potential victim.
Vulnerability
A Stored cross-Site scripting (XSS) vulnerability has been identified in Dev blog, which allows an attacker to attacker to execute arbitrary JS code in the browser of any user of the application.
Exploit
exploit.html
exploit.js
Our security policy
We have reserved the ID CVE-2023-6142 to refer to this issue from now on.
System Information
Version: Dev Blog v1.0
Operating System: MacOS
Mitigation
There is currently no patch available for this vulnerability.
References
Vendor page https://github.com/Armanidrisi/devblog/
Timeline
IA generativa
14 nov 2023
Vendor Confirmed Vuln.
14 nov 2023
Vendor contacted
14 nov 2023
Public disclosure
15 nov 2023