2024-07-14 02:06:08 +00:00

133 lines
4.6 KiB
JSON

{
"id": "CVE-2021-21260",
"sourceIdentifier": "security-advisories@github.com",
"published": "2021-01-22T18:15:12.610",
"lastModified": "2021-01-29T14:11:08.443",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Online Invoicing System (OIS) is open source software which is a lean invoicing system for small businesses, consultants and freelancers created using AppGini. In OIS version 4.0 there is a stored XSS which can enables an attacker takeover of the admin account through a payload that extracts a csrf token and sends a request to change password. It has been found that Item description is reflected without sanitization in app/items_view.php which enables the malicious scenario."
},
{
"lang": "es",
"value": "El Sistema de Facturaci\u00f3n en L\u00ednea (OIS) es un software de c\u00f3digo abierto que es un sistema de facturaci\u00f3n ajustado para peque\u00f1as empresas, consultores y aut\u00f3nomos creado con AppGini. En OIS versi\u00f3n 4.0 se presenta una vulnerabilidad de tipo XSS almacenado que puede permitir que un atacante tome el control de la cuenta de administrador por medio de una carga \u00fatil que extrae un token csrf y env\u00eda una petici\u00f3n para cambiar la contrase\u00f1a. Se ha detectado que la descripci\u00f3n del art\u00edculo se refleja sin saneamiento en el archivo app/items_view.php, lo que habilita el escenario malicioso"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 4.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bigprof:online_invoicing_system:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "03A30130-6CAE-4330-95EF-8658D93EF4C4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/bigprof-software/online-invoicing-system/releases/tag/4.2",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/bigprof-software/online-invoicing-system/security/advisories/GHSA-rm79-5596-r7q4",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}