Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-41101
HistorySep 30, 2021 - 7:20 p.m.

CVE-2021-41101 CORS `Access-Control-Allow-Origin` settings are too lenient

2021-09-3019:20:09
CWE-79
GitHub_M
www.cve.org
10
cve-2021-41101
cors
access-control-allow-origin
wire-server
nginz
xss
subdomains
patch
workaround
compromise
cookie
account-pages
team-settings
webapp
security
collaboration

CVSS3

5.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

AI Score

5.6

Confidence

High

EPSS

0.001

Percentile

28.4%

wire-server is an open-source back end for Wire, a secure collaboration platform. Before version 2.106.0, the CORS Access-Control-Allow-Origin header set by nginz is set for all subdomains of .wire.com (including wire.com). This means that if somebody were to find an XSS vector in any of the subdomains, they could use it to talk to the Wire API using the user’s Cookie. A patch does not exist, but a workaround does. To make sure that a compromise of one subdomain does not yield access to the cookie of another, one may limit the Access-Control-Allow-Origin header to apps that actually require the cookie (account-pages, team-settings and the webapp).

CNA Affected

[
  {
    "product": "wire-server",
    "vendor": "wireapp",
    "versions": [
      {
        "status": "affected",
        "version": "< 2.106.0"
      }
    ]
  }
]

CVSS3

5.7

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

AI Score

5.6

Confidence

High

EPSS

0.001

Percentile

28.4%

Related for CVELIST:CVE-2021-41101