Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

1 vulnerability by webuzo

CVE-2021-40238 (GCVE-0-2021-40238)

Vulnerability from cvelistv5 – Published: 2021-09-15 16:19 – Updated: 2024-08-04 02:27
VLAI?
Summary
A Cross Site Scriptiong (XSS) vulnerability exists in the admin panel in Webuzo < 2.9.0 via an HTTP request to a non-existent page, which is activated by administrators viewing the "Error Log" page. An attacker can leverage this to achieve Unauthenticated Remote Code Execution via the "Cron Jobs" functionality of Webuzo.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T02:27:31.856Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gist.github.com/omriinbar/5a24ccc2127ac61b6d9872c9405ebc8e"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.webuzo.com/blog/webuzo-2-9-0-launched/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A Cross Site Scriptiong (XSS) vulnerability exists in the admin panel in Webuzo \u003c 2.9.0 via an HTTP request to a non-existent page, which is activated by administrators viewing the \"Error Log\" page. An attacker can leverage this to achieve Unauthenticated Remote Code Execution via the \"Cron Jobs\" functionality of Webuzo."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-15T16:19:57.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gist.github.com/omriinbar/5a24ccc2127ac61b6d9872c9405ebc8e"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.webuzo.com/blog/webuzo-2-9-0-launched/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-40238",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A Cross Site Scriptiong (XSS) vulnerability exists in the admin panel in Webuzo \u003c 2.9.0 via an HTTP request to a non-existent page, which is activated by administrators viewing the \"Error Log\" page. An attacker can leverage this to achieve Unauthenticated Remote Code Execution via the \"Cron Jobs\" functionality of Webuzo."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://gist.github.com/omriinbar/5a24ccc2127ac61b6d9872c9405ebc8e",
              "refsource": "MISC",
              "url": "https://gist.github.com/omriinbar/5a24ccc2127ac61b6d9872c9405ebc8e"
            },
            {
              "name": "https://www.webuzo.com/blog/webuzo-2-9-0-launched/",
              "refsource": "MISC",
              "url": "https://www.webuzo.com/blog/webuzo-2-9-0-launched/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-40238",
    "datePublished": "2021-09-15T16:19:57.000Z",
    "dateReserved": "2021-08-30T00:00:00.000Z",
    "dateUpdated": "2024-08-04T02:27:31.856Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}