CVE-2021-27915 (GCVE-0-2021-27915)
Vulnerability from cvelistv5 – Published: 2024-09-17 14:02 – Updated: 2024-09-17 16:01
VLAI?
Summary
Prior to the patched version, there is an XSS vulnerability in the description fields within the Mautic application which could be exploited by a logged in user of Mautic with the appropriate permissions.
This could lead to the user having elevated access to the system.
Severity ?
7.6 (High)
CWE
Assigner
References
Impacted products
Credits
Lenon Leite
Lenon Leite
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:mautic:mautic:-:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "mautic",
"vendor": "mautic",
"versions": [
{
"lessThanOrEqual": "4.4.11",
"status": "affected",
"version": "1.0.0-beta2",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-27915",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-17T15:59:08.355119Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-17T16:01:29.250Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://packagist.org",
"defaultStatus": "unaffected",
"packageName": "mautic/core-lib",
"product": "Mautic",
"repo": "https://github.com/mautic/mautic",
"vendor": "Mautic",
"versions": [
{
"lessThanOrEqual": "\u003c= 4.4.11",
"status": "affected",
"version": "\u003e= 1.0.0-beta2",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "remediation developer",
"value": "Lenon Leite"
},
{
"lang": "en",
"type": "finder",
"value": "Lenon Leite"
}
],
"datePublic": "2024-04-11T09:36:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003e\u003cspan style=\"background-color: var(--wht);\"\u003ePrior to the patched version, there is an XSS vulnerability in the description fields within the Mautic application which could be exploited by a logged in user of Mautic with the appropriate permissions.\u003c/span\u003e\u003c/p\u003e\u003cp\u003eThis could lead to the user having elevated access to the system.\u003c/p\u003e\u003cbr\u003e"
}
],
"value": "Prior to the patched version, there is an XSS vulnerability in the description fields within the Mautic application which could be exploited by a logged in user of Mautic with the appropriate permissions.\n\nThis could lead to the user having elevated access to the system."
}
],
"impacts": [
{
"capecId": "CAPEC-592",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-592 Stored XSS"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-80",
"description": "CWE-80",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-17T14:02:09.969Z",
"orgId": "4e531c38-7a33-45d3-98dd-d909c0d8852e",
"shortName": "Mautic"
},
"references": [
{
"url": "https://github.com/mautic/mautic/security/advisories/GHSA-2rc5-2755-v422"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to 4.4.12 or later."
}
],
"value": "Update to 4.4.12 or later."
}
],
"source": {
"advisory": "https://github.com/mautic/mautic/security/advisories/GHSA-2rc5-2",
"discovery": "INTERNAL"
},
"title": "XSS Cross-site Scripting Stored (XSS) - Description field",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "4e531c38-7a33-45d3-98dd-d909c0d8852e",
"assignerShortName": "Mautic",
"cveId": "CVE-2021-27915",
"datePublished": "2024-09-17T14:02:09.969Z",
"dateReserved": "2021-03-02T15:53:50.859Z",
"dateUpdated": "2024-09-17T16:01:29.250Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0.0\", \"versionEndExcluding\": \"4.4.12\", \"matchCriteriaId\": \"71754804-5279-4236-8CE2-434BC23B4A30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acquia:mautic:1.0.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"99718D48-5C19-41C5-84E1-52E95F012830\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acquia:mautic:1.0.0:beta2:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B21EB9D-BFCD-4D58-BCA6-3AAE6B3B9041\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acquia:mautic:1.0.0:beta3:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C1C106B-1B3D-427D-8147-5527E610F569\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acquia:mautic:1.0.0:beta4:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E35B0F0-9BF1-45FA-8954-B8BFB7389C4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acquia:mautic:1.0.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"213A9276-B9D1-4B4D-BBE9-FC42B6D63DE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acquia:mautic:1.0.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"F366E4D8-1515-4E5F-8551-4C8D9E00D0D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acquia:mautic:1.0.0:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4234B41-F219-45B7-83A1-8F0F652F2A8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:acquia:mautic:1.0.0:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA028F70-6020-47D6-BEC0-6FC0C7E18420\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Prior to the patched version, there is an XSS vulnerability in the description fields within the Mautic application which could be exploited by a logged in user of Mautic with the appropriate permissions.\\n\\nThis could lead to the user having elevated access to the system.\"}, {\"lang\": \"es\", \"value\": \"Antes de la versi\\u00f3n parcheada, existe una vulnerabilidad XSS en los campos de descripci\\u00f3n dentro de la aplicaci\\u00f3n Mautic que podr\\u00eda ser explotada por un usuario registrado de Mautic con los permisos adecuados. Esto podr\\u00eda provocar que el usuario tenga acceso elevado al sistema.\"}]",
"id": "CVE-2021-27915",
"lastModified": "2024-09-29T00:22:31.787",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security@mautic.org\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L\", \"baseScore\": 7.6, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 2.1, \"impactScore\": 5.5}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\", \"baseScore\": 9.0, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.3, \"impactScore\": 6.0}]}",
"published": "2024-09-17T14:15:14.100",
"references": "[{\"url\": \"https://github.com/mautic/mautic/security/advisories/GHSA-2rc5-2755-v422\", \"source\": \"security@mautic.org\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@mautic.org",
"vulnStatus": "Analyzed",
"weaknesses": "[{\"source\": \"security@mautic.org\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-80\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-27915\",\"sourceIdentifier\":\"security@mautic.org\",\"published\":\"2024-09-17T14:15:14.100\",\"lastModified\":\"2024-09-29T00:22:31.787\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Prior to the patched version, there is an XSS vulnerability in the description fields within the Mautic application which could be exploited by a logged in user of Mautic with the appropriate permissions.\\n\\nThis could lead to the user having elevated access to the system.\"},{\"lang\":\"es\",\"value\":\"Antes de la versi\u00f3n parcheada, existe una vulnerabilidad XSS en los campos de descripci\u00f3n dentro de la aplicaci\u00f3n Mautic que podr\u00eda ser explotada por un usuario registrado de Mautic con los permisos adecuados. Esto podr\u00eda provocar que el usuario tenga acceso elevado al sistema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@mautic.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L\",\"baseScore\":7.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.1,\"impactScore\":5.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":9.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.3,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"security@mautic.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-80\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.0\",\"versionEndExcluding\":\"4.4.12\",\"matchCriteriaId\":\"71754804-5279-4236-8CE2-434BC23B4A30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acquia:mautic:1.0.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"99718D48-5C19-41C5-84E1-52E95F012830\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acquia:mautic:1.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B21EB9D-BFCD-4D58-BCA6-3AAE6B3B9041\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acquia:mautic:1.0.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C1C106B-1B3D-427D-8147-5527E610F569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acquia:mautic:1.0.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E35B0F0-9BF1-45FA-8954-B8BFB7389C4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acquia:mautic:1.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"213A9276-B9D1-4B4D-BBE9-FC42B6D63DE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acquia:mautic:1.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F366E4D8-1515-4E5F-8551-4C8D9E00D0D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acquia:mautic:1.0.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4234B41-F219-45B7-83A1-8F0F652F2A8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:acquia:mautic:1.0.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA028F70-6020-47D6-BEC0-6FC0C7E18420\"}]}]}],\"references\":[{\"url\":\"https://github.com/mautic/mautic/security/advisories/GHSA-2rc5-2755-v422\",\"source\":\"security@mautic.org\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-27915\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-17T15:59:08.355119Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:mautic:mautic:-:*:*:*:*:*:*:*\"], \"vendor\": \"mautic\", \"product\": \"mautic\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0.0-beta2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"4.4.11\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-17T16:00:44.787Z\"}}], \"cna\": {\"title\": \"XSS Cross-site Scripting Stored (XSS) - Description field\", \"source\": {\"advisory\": \"https://github.com/mautic/mautic/security/advisories/GHSA-2rc5-2\", \"discovery\": \"INTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"remediation developer\", \"value\": \"Lenon Leite\"}, {\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Lenon Leite\"}], \"impacts\": [{\"capecId\": \"CAPEC-592\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-592 Stored XSS\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://github.com/mautic/mautic\", \"vendor\": \"Mautic\", \"product\": \"Mautic\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 1.0.0-beta2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"\u003c= 4.4.11\"}], \"packageName\": \"mautic/core-lib\", \"collectionURL\": \"https://packagist.org\", \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Update to 4.4.12 or later.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Update to 4.4.12 or later.\", \"base64\": false}]}], \"datePublic\": \"2024-04-11T09:36:00.000Z\", \"references\": [{\"url\": \"https://github.com/mautic/mautic/security/advisories/GHSA-2rc5-2755-v422\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Prior to the patched version, there is an XSS vulnerability in the description fields within the Mautic application which could be exploited by a logged in user of Mautic with the appropriate permissions.\\n\\nThis could lead to the user having elevated access to the system.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003e\u003cspan style=\\\"background-color: var(--wht);\\\"\u003ePrior to the patched version, there is an XSS vulnerability in the description fields within the Mautic application which could be exploited by a logged in user of Mautic with the appropriate permissions.\u003c/span\u003e\u003c/p\u003e\u003cp\u003eThis could lead to the user having elevated access to the system.\u003c/p\u003e\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-80\", \"description\": \"CWE-80\"}]}], \"providerMetadata\": {\"orgId\": \"4e531c38-7a33-45d3-98dd-d909c0d8852e\", \"shortName\": \"Mautic\", \"dateUpdated\": \"2024-09-17T14:02:09.969Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2021-27915\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-17T16:01:29.250Z\", \"dateReserved\": \"2021-03-02T15:53:50.859Z\", \"assignerOrgId\": \"4e531c38-7a33-45d3-98dd-d909c0d8852e\", \"datePublished\": \"2024-09-17T14:02:09.969Z\", \"assignerShortName\": \"Mautic\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…