cve/2024/CVE-2024-34710.md

19 lines
1.1 KiB
Markdown
Raw Normal View History

2024-06-08 09:32:58 +00:00
### [CVE-2024-34710](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34710)
![](https://img.shields.io/static/v1?label=Product&message=wiki&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%3D%202.5.302%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine&color=brighgreen)
### Description
Wiki.js is al wiki app built on Node.js. Client side template injection was discovered, that could allow an attacker to inject malicious JavaScript into the content section of pages that would execute once a victim loads the page that contains the payload. This was possible through the injection of a invalid HTML tag with a template injection payload on the next line. This vulnerability is fixed in 2.5.303.
### POC
#### Reference
- https://github.com/requarks/wiki/security/advisories/GHSA-xjcj-p2qv-q3rf
2024-06-09 00:33:16 +00:00
- https://github.com/requarks/wiki/security/advisories/GHSA-xjcj-p2qv-q3rf
2024-06-08 09:32:58 +00:00
#### Github
No PoCs found on GitHub currently.