CVE-2021-4266

Published: Dic 21, 2022 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2021-34108 Aliases: GSD-2021-4266
ExploitDB:
Other exploit source:
Google Dorks:
LOW 3,5
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: required
Scope: unchanged
Confidentiality: none
Integrity: low
Availability: none

Description

AI Translation Available

A vulnerability classified as problematic has been found in Webdetails cpf up to 9.5.0.0-80. Affected is an unknown function of the file core/src/main/java/pt/webdetails/cpf/packager/DependenciesPackage.java. The manipulation of the argument baseUrl leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 9.5.0.0-81 is able to address this issue. The name of the patch is 3bff900d228e8cae3af256b447c5d15bdb03c174. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216468.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0064
Percentile
0,7th
Updated

EPSS Score Trend (Last 90 Days)

79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Stable
Common Consequences
Security Scopes Affected:
Access Control Confidentiality Integrity Availability
Potential Impacts:
Bypass Protection Mechanism Read Application Data Execute Unauthorized Code Or Commands
Applicable Platforms
Technologies: AI/ML, Web Based, Web Server
View CWE Details
707

Improper Neutralization

Incomplete
Common Consequences
Security Scopes Affected:
Other
Potential Impacts:
Other
Applicable Platforms
All platforms may be affected
View CWE Details
Application

Community Plugin Framework by Hitachi

Version Range Affected
To 9.5.0.0-81 (exclusive)
cpe:2.3:a:hitachi:community_plugin_framework:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/siwapp/siwapp-ror/pull/365
https://github.com/webdetails/cpf/commit/3bff900d228e8cae3af256b447c5d15bdb03c1…
https://github.com/webdetails/cpf/releases/tag/9.5.0.0-81
https://vuldb.com/?id.216468
Third Party Advisory VDB Entry
https://vuldb.com/?id.216468
https://github.com/siwapp/siwapp-ror/pull/365
https://github.com/webdetails/cpf/commit/3bff900d228e8cae3af256b447c5d15bdb03c1…
https://github.com/webdetails/cpf/releases/tag/9.5.0.0-81
https://vuldb.com/?id.216468
Third Party Advisory VDB Entry
https://vuldb.com/?id.216468