Adobe ColdFusion - Cross-Site Scripting
ID: CVE-2021-21087
Severity: medium
Author: Daviey
Tags: cve2021,cve,xss,adobe,misc,coldfusion
Description
Section titled “Description”Adobe Coldfusion versions 2016 (update 16 and earlier), 2018 (update 10 and earlier) and 2021.0.0.323925 are affected by an Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) vulnerability. An attacker could abuse this vulnerability to execute arbitrary JavaScript code in context of the current user. Exploitation of this issue requires user interaction.
YAML Source
Section titled “YAML Source”id: CVE-2021-21087
info: name: Adobe ColdFusion - Cross-Site Scripting author: Daviey severity: medium description: | Adobe Coldfusion versions 2016 (update 16 and earlier), 2018 (update 10 and earlier) and 2021.0.0.323925 are affected by an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability. An attacker could abuse this vulnerability to execute arbitrary JavaScript code in context of the current user. Exploitation of this issue requires user interaction. impact: | Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Apply the latest security patches or updates provided by Adobe to mitigate this vulnerability. reference: - https://helpx.adobe.com/security/products/coldfusion/apsb21-16.html - https://twitter.com/Daviey/status/1374070630283415558 - https://nvd.nist.gov/vuln/detail/CVE-2021-21087 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N cvss-score: 5.4 cve-id: CVE-2021-21087 cwe-id: CWE-79 epss-score: 0.00179 epss-percentile: 0.54989 cpe: cpe:2.3:a:adobe:coldfusion:2016:-:*:*:*:*:*:* metadata: max-request: 7 vendor: adobe product: coldfusion shodan-query: - http.component:"Adobe ColdFusion" - http.component:"adobe coldfusion" - http.title:"coldfusion administrator login" - cpe:"cpe:2.3:a:adobe:coldfusion" fofa-query: - title="coldfusion administrator login" - app="adobe-coldfusion" google-query: intitle:"coldfusion administrator login" tags: cve2021,cve,xss,adobe,misc,coldfusion
http: - method: GET path: - "{{BaseURL}}/cf_scripts/scripts/ajax/package/cfajax.js" - "{{BaseURL}}/cf-scripts/scripts/ajax/package/cfajax.js" - "{{BaseURL}}/CFIDE/scripts/ajax/package/cfajax.js" - "{{BaseURL}}/cfide/scripts/ajax/package/cfajax.js" - "{{BaseURL}}/CF_SFSD/scripts/ajax/package/cfajax.js" - "{{BaseURL}}/cfide-scripts/ajax/package/cfajax.js" - "{{BaseURL}}/cfmx/CFIDE/scripts/ajax/package/cfajax.js"
stop-at-first-match: true
matchers-condition: and matchers: - type: regex regex: - 'eval\(\"\(\"\+json\+\"\)\"\)'
- type: status status: - 200# digest: 4a0a0047304502201325b77ea5f95c5afe4f38439cfc6ac16b26544cd6f4553420d5303c64730f3f022100c2ee784d45c0ef8cac2cca5d1ea84b96d14e6ae906f407af2cb67cc189636cf9:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-21087.yaml"