CVE-2021-37392

Published at:
2021-07-26T18:15:08.517

Global infos:

In RPCMS v1.8 and below, the "nickname" variable is not properly sanitized before being displayed on page. When the API functions are enabled, the attacker can use API to update user nickname with XSS payload and achieve stored XSS. Users who view the articles published by the injected user will trigger the XSS.

CVE Status: Modified

References:

  • [email protected]
  • [email protected]
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • Metrics:

    AttributeValue
    Attack ComplexityLOW
    Attack VectorNETWORK
    Availability ImpactNONE
    Base Score5.4
    Base SeverityMEDIUM
    Confidentiality ImpactLOW
    Integrity ImpactLOW
    Privileges RequiredLOW
    ScopeCHANGED
    User InteractionREQUIRED
    Vector StringCVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
    Exploitability Score2.3
    Impact Score2.7
    Source[email protected]
    TypePrimary

    Links:

    Exploit-db
    Github