From 855a848fd0534b1020c6fa02c106658f5e366486 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Mon, 28 Feb 2022 13:05:03 -0500 Subject: [PATCH] Enhancement: cves/2021/CVE-2021-42567.yaml by mp --- cves/2021/CVE-2021-42567.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-42567.yaml b/cves/2021/CVE-2021-42567.yaml index 5a45c91b8b..3c9d150fbf 100644 --- a/cves/2021/CVE-2021-42567.yaml +++ b/cves/2021/CVE-2021-42567.yaml @@ -1,10 +1,10 @@ id: CVE-2021-42567 info: - name: Apereo CAS Reflected XSS + name: Apereo CAS Reflected Cross-Site Scripting author: pdteam severity: medium - description: Apereo CAS through 6.4.1 allows XSS via POST requests sent to the REST API endpoints. + description: Apereo CAS through 6.4.1 allows cross-site scripting via POST requests sent to the REST API endpoints. reference: - https://apereo.github.io/2021/10/18/restvuln/ - https://www.sudokaikan.com/2021/12/exploit-cve-2021-42567-post-based-xss.html @@ -40,3 +40,5 @@ requests: - type: status status: - 401 + +# Enhanced by mp on 2022/02/28