id: CVE-2021-34370 info: name: Accela Civic Platform <=21.1 - Cross-Site Scripting author: 0x_Akoko severity: medium description: Accela Civic Platform through 21.1 contains a cross-site scripting vulnerability via ssoAdapter/logoutAction.do successURL. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential data theft, session hijacking, or defacement of the affected application. remediation: | Upgrade to a patched version of Accela Civic Platform (version >21.1) that includes proper input validation and sanitization. reference: - https://www.exploit-db.com/exploits/49990 - https://www.accela.com/civic-platform/ - https://gist.github.com/0xx7/7e9f1b725f7ff98b9239d3cb027b7dc8 - https://nvd.nist.gov/vuln/detail/CVE-2021-34370 - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2021-34370 cwe-id: CWE-79 epss-score: 0.00183 epss-percentile: 0.55682 cpe: cpe:2.3:a:accela:civic_platform:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: accela product: civic_platform tags: cve,cve2021,xss,redirect,accela,edb http: - method: GET path: - "{{BaseURL}}/ssoAdapter/logoutAction.do?servProvCode=SAFVC&successURL=https://interact.sh/" matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$' # digest: 4a0a0047304502201d9e6b2883758d074ec0c411e34a30c2ee456f0fce51956df214a032a0655fc9022100d495238e01d0bce37a3a306618ed52b0e2e5a437d8cd1c3130aea1d4b73402aa:922c64590222798bb761d5b6d8e72950