Accela Civic Platform <=21.1 - Cross-Site Scripting
ID: CVE-2021-34370
Severity: medium
Author: 0x_Akoko
Tags: cve,cve2021,xss,redirect,accela,edb
Description
Section titled “Description”Accela Civic Platform through 21.1 contains a cross-site scripting vulnerability via ssoAdapter/logoutAction.do successURL.
YAML Source
Section titled “YAML Source”id: CVE-2021-34370
info: name: Accela Civic Platform <=21.1 - Cross-Site Scripting author: 0x_Akoko severity: medium description: Accela Civic Platform through 21.1 contains a cross-site scripting vulnerability via ssoAdapter/logoutAction.do successURL. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential data theft, session hijacking, or defacement of the affected application. remediation: | Upgrade to a patched version of Accela Civic Platform (version >21.1) that includes proper input validation and sanitization. reference: - https://www.exploit-db.com/exploits/49990 - https://www.accela.com/civic-platform/ - https://gist.github.com/0xx7/7e9f1b725f7ff98b9239d3cb027b7dc8 - https://nvd.nist.gov/vuln/detail/CVE-2021-34370 - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2021-34370 cwe-id: CWE-79 epss-score: 0.00183 epss-percentile: 0.55682 cpe: cpe:2.3:a:accela:civic_platform:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: accela product: civic_platform tags: cve,cve2021,xss,redirect,accela,edb
http: - method: GET path: - "{{BaseURL}}/ssoAdapter/logoutAction.do?servProvCode=SAFVC&successURL=https://interact.sh/"
matchers: - type: regex part: header regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'# digest: 4a0a004730450220444f79513207150da47721c37b988cd41388690c80de9f5cedd2b0a5733ba4e8022100f1d7e1c46a0c79c9e2c2cea6386d0c2ff87c5510c89b0514c14fb2dda4f52ef5:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-34370.yaml"