2021-09-02 23:15:23 +00:00
id : CVE-2021-34370
info :
2022-08-29 13:55:23 +00:00
name : Accela Civic Platform <=21.1 - Cross-Site Scripting
2021-09-02 23:15:23 +00:00
author : 0x_Akoko
severity : medium
2022-08-29 13:55:23 +00:00
description : Accela Civic Platform through 21.1 contains a cross-site scripting vulnerability via ssoAdapter/logoutAction.do successURL.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential data theft, session hijacking, or defacement of the affected application.
2023-09-06 12:09:01 +00:00
remediation : |
Upgrade to a patched version of Accela Civic Platform (version >21.1) that includes proper input validation and sanitization.
2021-09-03 03:46:36 +00:00
reference :
- https://www.exploit-db.com/exploits/49990
- https://www.accela.com/civic-platform/
2022-05-17 09:18:12 +00:00
- https://gist.github.com/0xx7/7e9f1b725f7ff98b9239d3cb027b7dc8
2022-08-29 13:55:23 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-34370
2024-01-29 17:11:14 +00:00
- https://github.com/ARPSyndicate/cvemon
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.1
2021-09-10 11:26:40 +00:00
cve-id : CVE-2021-34370
cwe-id : CWE-79
2023-04-12 10:55:48 +00:00
epss-score : 0.00183
2024-01-29 17:11:14 +00:00
epss-percentile : 0.55682
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:a:accela:civic_platform:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : accela
product : civic_platform
2024-01-14 09:21:50 +00:00
tags : cve,cve2021,xss,redirect,accela,edb
2021-09-02 23:15:23 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-09-02 23:15:23 +00:00
- method : GET
path :
2022-06-06 10:40:15 +00:00
- "{{BaseURL}}/ssoAdapter/logoutAction.do?servProvCode=SAFVC&successURL=https://interact.sh/"
2021-09-02 23:15:23 +00:00
matchers :
- type : regex
2023-07-11 19:49:27 +00:00
part : header
2021-09-02 23:15:23 +00:00
regex :
2022-06-06 10:40:15 +00:00
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
2024-01-26 08:31:11 +00:00
# digest: 4a0a0047304502201d9e6b2883758d074ec0c411e34a30c2ee456f0fce51956df214a032a0655fc9022100d495238e01d0bce37a3a306618ed52b0e2e5a437d8cd1c3130aea1d4b73402aa:922c64590222798bb761d5b6d8e72950