CVE-2021-43856

Published: Dic 27, 2021 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2021-30722 Aliases: GSD-2021-43856
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 8,2
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: required
Scope: changed
Confidentiality: high
Integrity: low
Availability: none
LOW 3,5
Access Vector: network
Access Complexity: medium
Authentication: single
Confidentiality: none
Integrity: partial
Availability: none

Description

AI Translation Available

Wiki.js is a wiki app built on Node.js. Wiki.js 2.5.263 and earlier is vulnerable to stored cross-site scripting through non-image file uploads for file types that can be viewed directly inline in the browser. By creating a malicious file which can execute inline JS when viewed in the browser (e.g. XML files), a malicious Wiki.js user may stage a stored cross-site scripting attack. This allows the attacker to execute malicious JavaScript when the file is viewed directly by other users. The file must be opened directly by the user and will not trigger directly in a normal Wiki.js page. A patch in version 2.5.264 fixes this vulnerability by adding an optional (enabled by default) force download flag to all non-image file types, preventing the file from being viewed inline in the browser. As a workaround, disable file upload for all non-trusted users. --- Thanks to @Haxatron for reporting this vulnerability. Initially reported via https://huntr.dev/bounties/266bff09-00d9-43ca-a4bb-bb540642811f/

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0043
Percentile
0,6th
Updated

EPSS Score Trend (Last 91 Days)

79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Stable
Common Consequences
Security Scopes Affected:
Access Control Confidentiality Integrity Availability
Potential Impacts:
Bypass Protection Mechanism Read Application Data Execute Unauthorized Code Or Commands
Applicable Platforms
Technologies: AI/ML, Web Based, Web Server
View CWE Details
Application

Wiki.Js by Requarks

Version Range Affected
To 2.5.264 (exclusive)
cpe:2.3:a:requarks:wiki.js:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/Requarks/wiki/commit/79bdd4409316adf649806de3e22352297f85cee0
https://github.com/Requarks/wiki/releases/tag/2.5.264
https://github.com/Requarks/wiki/security/advisories/GHSA-rhpf-929m-7fm2
https://github.com/Requarks/wiki/commit/79bdd4409316adf649806de3e22352297f85cee0
https://github.com/Requarks/wiki/releases/tag/2.5.264
https://github.com/Requarks/wiki/security/advisories/GHSA-rhpf-929m-7fm2