2021-12-18 09:02:44 +00:00
id : CVE-2021-45092
info :
name : Thinfinity Iframe Injection
author : danielmofer
2021-12-21 11:06:14 +00:00
severity : critical
2022-02-28 19:50:44 +00:00
description : A vulnerability exists in Thinfinity VirtualUI in a function located in /lab.html reachable which by default could allow IFRAME injection via the "vpath" parameter.
2023-09-06 12:09:01 +00:00
remediation : |
Apply the latest security patches or updates provided by the vendor to fix the vulnerability.
2021-12-18 09:02:44 +00:00
reference :
- https://github.com/cybelesoft/virtualui/issues/2
- https://nvd.nist.gov/vuln/detail/CVE-2021-44848
- https://www.tenable.com/cve/CVE-2021-45092
2023-04-12 10:55:48 +00:00
- http://packetstormsecurity.com/files/166068/Thinfinity-VirtualUI-2.5.41.0-IFRAME-Injection.html
2021-12-21 11:06:14 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2022-04-22 10:38:41 +00:00
cvss-score : 9.8
2021-12-21 11:06:14 +00:00
cve-id : CVE-2021-45092
cwe-id : CWE-74
2023-11-14 14:37:18 +00:00
epss-score : 0.0797
2023-11-23 06:31:41 +00:00
epss-percentile : 0.93592
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:a:cybelesoft:thinfinity_virtualui:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : cybelesoft
product : thinfinity_virtualui
2023-05-11 13:27:36 +00:00
tags : packetstorm,iframe,thinfinity,tenable,cve,cve2021,injection
2021-12-18 09:02:44 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-12-18 09:02:44 +00:00
- method : GET
path :
2022-06-06 10:40:15 +00:00
- "{{BaseURL}}/lab.html?vpath=//interact.sh"
2021-12-18 09:02:44 +00:00
matchers :
- type : regex
regex :
- ".*vpath.*"
- "thinfinity"
2022-02-28 19:50:44 +00:00
condition : and
2023-11-23 07:42:52 +00:00
# digest: 4a0a00473045022100c1aa918e7b9c6763e4f745b56e42f71239b4164201c5bdb04699078ef50a5856022008fd60f10b4dea34bd3c3ab377283af7013b496121b82ffb45036a141f966a53:922c64590222798bb761d5b6d8e72950