{ "id": "CVE-2021-38143", "sourceIdentifier": "cve@mitre.org", "published": "2021-08-31T05:15:06.563", "lastModified": "2021-09-08T14:59:47.690", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Form Tools through 3.0.20. When an administrator creates a customer account, it is possible for the customer to log in and proceed with a change of name and last name. However, these fields are vulnerable to XSS payload insertion, being triggered in the admin panel when the admin tries to see the client list. This type of XSS (stored) can lead to the extraction of the PHPSESSID cookie belonging to the admin." }, { "lang": "es", "value": "Se ha detectado un problema en Form Tools versiones hasta 3.0.20. Cuando un administrador crea una cuenta de cliente, es posible que el cliente inicie sesi\u00f3n y proceda a un cambio de nombre y apellido. Sin embargo, estos campos son vulnerables a una inserci\u00f3n de cargas \u00fatiles de tipo XSS, siendo desencadenadas en el panel de administraci\u00f3n cuando el administrador intenta ver la lista de clientes. Este tipo de ataque XSS (almacenado) puede conllevar a una extracci\u00f3n de la cookie PHPSESSID perteneciente al admin" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.8, "impactScore": 2.7 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.3 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:formtools:core:*:*:*:*:*:*:*:*", "versionEndIncluding": "3.0.20", "matchCriteriaId": "F3C206DF-25E1-483F-856F-BCACE79F6736" } ] } ] } ], "references": [ { "url": "https://bernardofsr.github.io/blog/2021/form-tools/", "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://github.com/bernardofsr/CVEs-With-PoC/blob/main/PoCs/Form%20Tools/README.md", "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://github.com/formtools/core", "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ] }, { "url": "https://www.formtools.org/", "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ] } ] }