eLabFTW vulnerable to HTML Injection in extended search error message
Description
eLabFTW is an open source electronic lab notebook for research labs. A vulnerability in versions prior to 5.1.5 allows an attacker to inject arbitrary HTML tags in the pages: "experiments.php" (show mode), "database.php" (show mode) or "search.php". It works by providing HTML code in the extended search string, which will then be displayed back to the user in the error message. This means that injected HTML will appear in a red "alert/danger" box, and be part of an error message. Due to some other security measures, it is not possible to execute arbitrary javascript from this attack. As such, this attack is deemed low impact. Users should upgrade to at least version 5.1.5 to receive a patch. No known workarounds are available.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/elabftw/elabftw/security/advisories/GHSA-cjww-pr9f-4c4wmitrex_refsource_CONFIRM
- www.acunetix.com/vulnerabilities/web/html-injectionmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.