CVE-2021-27915
Vulnerability from cvelistv5
Published
2024-09-17 14:02
Modified
2024-09-17 16:01
Severity ?
EPSS score ?
Summary
Prior to the patched version, there is an XSS vulnerability in the description fields within the Mautic application which could be exploited by a logged in user of Mautic with the appropriate permissions.
This could lead to the user having elevated access to the system.
References
▼ | URL | Tags | |
---|---|---|---|
security@mautic.org | https://github.com/mautic/mautic/security/advisories/GHSA-2rc5-2755-v422 | Vendor Advisory |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:mautic:mautic:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "mautic", "vendor": "mautic", "versions": [ { "lessThanOrEqual": "4.4.11", "status": "affected", "version": "1.0.0-beta2", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2021-27915", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-17T15:59:08.355119Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-17T16:01:29.250Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://packagist.org", "defaultStatus": "unaffected", "packageName": "mautic/core-lib", "product": "Mautic", "repo": "https://github.com/mautic/mautic", "vendor": "Mautic", "versions": [ { "lessThanOrEqual": "\u003c= 4.4.11", "status": "affected", "version": "\u003e= 1.0.0-beta2", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "remediation developer", "value": "Lenon Leite" }, { "lang": "en", "type": "finder", "value": "Lenon Leite" } ], "datePublic": "2024-04-11T09:36:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003e\u003cspan style=\"background-color: var(--wht);\"\u003ePrior to the patched version, there is an XSS vulnerability in the description fields within the Mautic application which could be exploited by a logged in user of Mautic with the appropriate permissions.\u003c/span\u003e\u003c/p\u003e\u003cp\u003eThis could lead to the user having elevated access to the system.\u003c/p\u003e\u003cbr\u003e" } ], "value": "Prior to the patched version, there is an XSS vulnerability in the description fields within the Mautic application which could be exploited by a logged in user of Mautic with the appropriate permissions.\n\nThis could lead to the user having elevated access to the system." } ], "impacts": [ { "capecId": "CAPEC-592", "descriptions": [ { "lang": "en", "value": "CAPEC-592 Stored XSS" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-80", "description": "CWE-80", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T14:02:09.969Z", "orgId": "4e531c38-7a33-45d3-98dd-d909c0d8852e", "shortName": "Mautic" }, "references": [ { "url": "https://github.com/mautic/mautic/security/advisories/GHSA-2rc5-2755-v422" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to 4.4.12 or later." } ], "value": "Update to 4.4.12 or later." } ], "source": { "advisory": "https://github.com/mautic/mautic/security/advisories/GHSA-2rc5-2", "discovery": "INTERNAL" }, "title": "XSS Cross-site Scripting Stored (XSS) - Description field", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "4e531c38-7a33-45d3-98dd-d909c0d8852e", "assignerShortName": "Mautic", "cveId": "CVE-2021-27915", "datePublished": "2024-09-17T14:02:09.969Z", "dateReserved": "2021-03-02T15:53:50.859Z", "dateUpdated": "2024-09-17T16:01:29.250Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0.0\", \"versionEndExcluding\": \"4.4.12\", \"matchCriteriaId\": \"71754804-5279-4236-8CE2-434BC23B4A30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acquia:mautic:1.0.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"99718D48-5C19-41C5-84E1-52E95F012830\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acquia:mautic:1.0.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B21EB9D-BFCD-4D58-BCA6-3AAE6B3B9041\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acquia:mautic:1.0.0:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C1C106B-1B3D-427D-8147-5527E610F569\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acquia:mautic:1.0.0:beta4:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E35B0F0-9BF1-45FA-8954-B8BFB7389C4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acquia:mautic:1.0.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"213A9276-B9D1-4B4D-BBE9-FC42B6D63DE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acquia:mautic:1.0.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"F366E4D8-1515-4E5F-8551-4C8D9E00D0D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acquia:mautic:1.0.0:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4234B41-F219-45B7-83A1-8F0F652F2A8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acquia:mautic:1.0.0:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA028F70-6020-47D6-BEC0-6FC0C7E18420\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Prior to the patched version, there is an XSS vulnerability in the description fields within the Mautic application which could be exploited by a logged in user of Mautic with the appropriate permissions.\\n\\nThis could lead to the user having elevated access to the system.\"}, {\"lang\": \"es\", \"value\": \"Antes de la versi\\u00f3n parcheada, existe una vulnerabilidad XSS en los campos de descripci\\u00f3n dentro de la aplicaci\\u00f3n Mautic que podr\\u00eda ser explotada por un usuario registrado de Mautic con los permisos adecuados. Esto podr\\u00eda provocar que el usuario tenga acceso elevado al sistema.\"}]", "id": "CVE-2021-27915", "lastModified": "2024-09-29T00:22:31.787", "metrics": "{\"cvssMetricV31\": [{\"source\": \"security@mautic.org\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L\", \"baseScore\": 7.6, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 2.1, \"impactScore\": 5.5}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\", \"baseScore\": 9.0, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 6.0}]}", "published": "2024-09-17T14:15:14.100", "references": "[{\"url\": \"https://github.com/mautic/mautic/security/advisories/GHSA-2rc5-2755-v422\", \"source\": \"security@mautic.org\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "security@mautic.org", "vulnStatus": "Analyzed", "weaknesses": "[{\"source\": \"security@mautic.org\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-80\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2021-27915\",\"sourceIdentifier\":\"security@mautic.org\",\"published\":\"2024-09-17T14:15:14.100\",\"lastModified\":\"2024-09-29T00:22:31.787\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Prior to the patched version, there is an XSS vulnerability in the description fields within the Mautic application which could be exploited by a logged in user of Mautic with the appropriate permissions.\\n\\nThis could lead to the user having elevated access to the system.\"},{\"lang\":\"es\",\"value\":\"Antes de la versi\u00f3n parcheada, existe una vulnerabilidad XSS en los campos de descripci\u00f3n dentro de la aplicaci\u00f3n Mautic que podr\u00eda ser explotada por un usuario registrado de Mautic con los permisos adecuados. Esto podr\u00eda provocar que el usuario tenga acceso elevado al sistema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@mautic.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L\",\"baseScore\":7.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.1,\"impactScore\":5.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":9.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.3,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"security@mautic.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-80\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.0\",\"versionEndExcluding\":\"4.4.12\",\"matchCriteriaId\":\"71754804-5279-4236-8CE2-434BC23B4A30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acquia:mautic:1.0.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"99718D48-5C19-41C5-84E1-52E95F012830\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acquia:mautic:1.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B21EB9D-BFCD-4D58-BCA6-3AAE6B3B9041\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acquia:mautic:1.0.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C1C106B-1B3D-427D-8147-5527E610F569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acquia:mautic:1.0.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E35B0F0-9BF1-45FA-8954-B8BFB7389C4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acquia:mautic:1.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"213A9276-B9D1-4B4D-BBE9-FC42B6D63DE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acquia:mautic:1.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F366E4D8-1515-4E5F-8551-4C8D9E00D0D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acquia:mautic:1.0.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4234B41-F219-45B7-83A1-8F0F652F2A8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acquia:mautic:1.0.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA028F70-6020-47D6-BEC0-6FC0C7E18420\"}]}]}],\"references\":[{\"url\":\"https://github.com/mautic/mautic/security/advisories/GHSA-2rc5-2755-v422\",\"source\":\"security@mautic.org\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-27915\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-17T15:59:08.355119Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:mautic:mautic:-:*:*:*:*:*:*:*\"], \"vendor\": \"mautic\", \"product\": \"mautic\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0.0-beta2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.4.11\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-17T16:00:44.787Z\"}}], \"cna\": {\"title\": \"XSS Cross-site Scripting Stored (XSS) - Description field\", \"source\": {\"advisory\": \"https://github.com/mautic/mautic/security/advisories/GHSA-2rc5-2\", \"discovery\": \"INTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"remediation developer\", \"value\": \"Lenon Leite\"}, {\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Lenon Leite\"}], \"impacts\": [{\"capecId\": \"CAPEC-592\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-592 Stored XSS\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://github.com/mautic/mautic\", \"vendor\": \"Mautic\", \"product\": \"Mautic\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 1.0.0-beta2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"\u003c= 4.4.11\"}], \"packageName\": \"mautic/core-lib\", \"collectionURL\": \"https://packagist.org\", \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Update to 4.4.12 or later.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Update to 4.4.12 or later.\", \"base64\": false}]}], \"datePublic\": \"2024-04-11T09:36:00.000Z\", \"references\": [{\"url\": \"https://github.com/mautic/mautic/security/advisories/GHSA-2rc5-2755-v422\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Prior to the patched version, there is an XSS vulnerability in the description fields within the Mautic application which could be exploited by a logged in user of Mautic with the appropriate permissions.\\n\\nThis could lead to the user having elevated access to the system.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003e\u003cspan style=\\\"background-color: var(--wht);\\\"\u003ePrior to the patched version, there is an XSS vulnerability in the description fields within the Mautic application which could be exploited by a logged in user of Mautic with the appropriate permissions.\u003c/span\u003e\u003c/p\u003e\u003cp\u003eThis could lead to the user having elevated access to the system.\u003c/p\u003e\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-80\", \"description\": \"CWE-80\"}]}], \"providerMetadata\": {\"orgId\": \"4e531c38-7a33-45d3-98dd-d909c0d8852e\", \"shortName\": \"Mautic\", \"dateUpdated\": \"2024-09-17T14:02:09.969Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2021-27915\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-17T16:01:29.250Z\", \"dateReserved\": \"2021-03-02T15:53:50.859Z\", \"assignerOrgId\": \"4e531c38-7a33-45d3-98dd-d909c0d8852e\", \"datePublished\": \"2024-09-17T14:02:09.969Z\", \"assignerShortName\": \"Mautic\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.