### [CVE-2024-13140](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13140) ![](https://img.shields.io/static/v1?label=Product&message=Emlog%20Pro&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=2.4.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=2.4.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=2.4.2%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=2.4.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Code%20Injection&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross%20Site%20Scripting&color=brightgreen) ### Description A vulnerability classified as problematic has been found in Emlog Pro up to 2.4.3. Affected is an unknown function of the file /admin/article.php?action=upload_cover of the component Cover Upload Handler. The manipulation of the argument image leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Es wurde eine problematische Schwachstelle in Emlog Pro bis 2.4.3 entdeckt. Betroffen hiervon ist ein unbekannter Ablauf der Datei /admin/article.php?action=upload_cover der Komponente Cover Upload Handler. Dank Manipulation des Arguments image mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung. ### POC #### Reference - https://github.com/emlog/emlog/issues/312 - https://github.com/emlog/emlog/issues/312#issue-2758546837 - https://vuldb.com/?id.290214 - https://vuldb.com/?submit.468753 #### Github - https://github.com/fkie-cad/nvd-json-data-feeds