nuclei-templates/http/cves/2021/CVE-2021-34370.yaml

41 lines
1.7 KiB
YAML

id: CVE-2021-34370
info:
name: Accela Civic Platform <=21.1 - Cross-Site Scripting
author: 0x_Akoko
severity: medium
description: Accela Civic Platform through 21.1 contains a cross-site scripting vulnerability via ssoAdapter/logoutAction.do successURL.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential data theft, session hijacking, or defacement of the affected application.
remediation: |
Upgrade to a patched version of Accela Civic Platform (version >21.1) that includes proper input validation and sanitization.
reference:
- https://www.exploit-db.com/exploits/49990
- https://www.accela.com/civic-platform/
- https://gist.github.com/0xx7/7e9f1b725f7ff98b9239d3cb027b7dc8
- https://nvd.nist.gov/vuln/detail/CVE-2021-34370
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2021-34370
cwe-id: CWE-79
epss-score: 0.00183
epss-percentile: 0.55429
cpe: cpe:2.3:a:accela:civic_platform:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: accela
product: civic_platform
tags: xss,redirect,cve,cve2021,accela,edb
http:
- method: GET
path:
- "{{BaseURL}}/ssoAdapter/logoutAction.do?servProvCode=SAFVC&successURL=https://interact.sh/"
matchers:
- type: regex
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
# digest: 490a00463044022051f17655253e398b138c33789f7309225634f81027f704249453698a80e7d18b02200de572baa80665607c62d435b15a443ade7bb26810c0da1c8fca852c48b7a72f:922c64590222798bb761d5b6d8e72950