Skip to content

Accela Civic Platform <=21.1 - Cross-Site Scripting

ID: CVE-2021-34370

Severity: medium

Author: 0x_Akoko

Tags: cve,cve2021,xss,redirect,accela,edb

Accela Civic Platform through 21.1 contains a cross-site scripting vulnerability via ssoAdapter/logoutAction.do successURL.

id: CVE-2021-34370
info:
name: Accela Civic Platform <=21.1 - Cross-Site Scripting
author: 0x_Akoko
severity: medium
description: Accela Civic Platform through 21.1 contains a cross-site scripting vulnerability via ssoAdapter/logoutAction.do successURL.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to potential data theft, session hijacking, or defacement of the affected application.
remediation: |
Upgrade to a patched version of Accela Civic Platform (version >21.1) that includes proper input validation and sanitization.
reference:
- https://www.exploit-db.com/exploits/49990
- https://www.accela.com/civic-platform/
- https://gist.github.com/0xx7/7e9f1b725f7ff98b9239d3cb027b7dc8
- https://nvd.nist.gov/vuln/detail/CVE-2021-34370
- https://github.com/ARPSyndicate/cvemon
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2021-34370
cwe-id: CWE-79
epss-score: 0.00183
epss-percentile: 0.55682
cpe: cpe:2.3:a:accela:civic_platform:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: accela
product: civic_platform
tags: cve,cve2021,xss,redirect,accela,edb
http:
- method: GET
path:
- "{{BaseURL}}/ssoAdapter/logoutAction.do?servProvCode=SAFVC&successURL=https://interact.sh/"
matchers:
- type: regex
part: header
regex:
- '(?m)^(?:Location\s*?:\s*?)(?:https?://|//)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh.*$'
# digest: 4a0a004730450220444f79513207150da47721c37b988cd41388690c80de9f5cedd2b0a5733ba4e8022100f1d7e1c46a0c79c9e2c2cea6386d0c2ff87c5510c89b0514c14fb2dda4f52ef5:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-34370.yaml"

View on Github