2023-01-16 17:41:15 +00:00
id : CVE-2021-21087
2021-03-22 19:31:51 +00:00
info :
2023-07-18 04:09:26 +00:00
name : Adobe ColdFusion - Cross-Site Scripting
2021-03-22 19:31:51 +00:00
author : Daviey
2022-10-10 19:40:25 +00:00
severity : medium
2023-07-18 07:50:37 +00:00
description : |
Adobe Coldfusion versions 2016 (update 16 and earlier), 2018 (update 10 and earlier) and 2021.0.0.323925 are affected by an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability. An attacker could abuse this vulnerability to execute arbitrary JavaScript code in context of the current user. Exploitation of this issue requires user interaction.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 12:09:01 +00:00
remediation : |
Apply the latest security patches or updates provided by Adobe to mitigate this vulnerability.
2021-08-18 11:37:49 +00:00
reference :
2021-08-19 14:44:46 +00:00
- https://helpx.adobe.com/security/products/coldfusion/apsb21-16.html
- https://twitter.com/Daviey/status/1374070630283415558
2023-07-18 07:50:37 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-21087
2024-03-23 09:28:19 +00:00
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
2022-10-10 19:22:59 +00:00
classification :
2022-10-10 19:40:25 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
cvss-score : 5.4
2022-10-10 19:22:59 +00:00
cve-id : CVE-2021-21087
2022-10-10 19:40:25 +00:00
cwe-id : CWE-79
2024-05-31 19:23:20 +00:00
epss-score : 0.00179
epss-percentile : 0.54989
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:a:adobe:coldfusion:2016:-:*:*:*:*:*:*
2022-05-12 14:18:36 +00:00
metadata :
2023-04-28 08:11:21 +00:00
max-request : 7
2023-07-11 19:49:27 +00:00
vendor : adobe
product : coldfusion
2024-06-07 10:04:29 +00:00
shodan-query :
- http.component:"Adobe ColdFusion"
- http.component:"adobe coldfusion"
- http.title:"coldfusion administrator login"
- cpe:"cpe:2.3:a:adobe:coldfusion"
fofa-query :
- title="coldfusion administrator login"
- app="adobe-coldfusion"
2024-05-31 19:23:20 +00:00
google-query : intitle:"coldfusion administrator login"
2024-01-14 09:21:50 +00:00
tags : cve2021,cve,xss,adobe,misc,coldfusion
2021-03-22 19:31:51 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-03-22 19:31:51 +00:00
- method : GET
path :
- "{{BaseURL}}/cf_scripts/scripts/ajax/package/cfajax.js"
- "{{BaseURL}}/cf-scripts/scripts/ajax/package/cfajax.js"
- "{{BaseURL}}/CFIDE/scripts/ajax/package/cfajax.js"
- "{{BaseURL}}/cfide/scripts/ajax/package/cfajax.js"
- "{{BaseURL}}/CF_SFSD/scripts/ajax/package/cfajax.js"
- "{{BaseURL}}/cfide-scripts/ajax/package/cfajax.js"
- "{{BaseURL}}/cfmx/CFIDE/scripts/ajax/package/cfajax.js"
2021-09-02 11:59:10 +00:00
stop-at-first-match : true
2023-08-31 11:46:18 +00:00
2021-03-22 19:31:51 +00:00
matchers-condition : and
matchers :
- type : regex
regex :
- 'eval\(\"\(\"\+json\+\"\)\"\)'
- type : status
status :
- 200
2024-06-08 16:02:17 +00:00
# digest: 4a0a00473045022100bf46937c66b95e18a8bdfeae0bf85b7e53914f28b457c41bc9b5909361f1321d02207b24624212f17608a553a1f2f470f9e8c45eb42e58d45741894b4d1a6be8b4b0:922c64590222798bb761d5b6d8e72950