CVE-2021-21312
Stored XSS on documents
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
GLPI is open source software which stands for Gestionnaire Libre de Parc Informatique and it is a Free Asset and IT Management Software package. In GLPI before verison 9.5.4, there is a vulnerability within the document upload function (Home > Management > Documents > Add, or /front/document.form.php endpoint), indeed one of the form field: "Web Link" is not properly sanitized and a malicious user (who has document upload rights) can use it to deliver JavaScript payload. For example if you use the following payload: " accesskey="x" onclick="alert(1)" x=", the content will be saved within the database without any control. And then once you return to the summary documents page, by clicking on the "Web Link" of the newly created file it will create a new empty tab, but on the initial tab the pop-up "1" will appear.
GLPI es un software de código abierto que significa Gestionnaire Libre de Parc Informatique y es un paquete gratuito de Software de Gestión de Activos y TI. En GLPI anterior a la versión 9.5.4, se presenta una vulnerabilidad dentro de la función de carga de documentos (Home ) Management ) Documents ) Add, o el archivo /front/document.form.php endpoint), de hecho, uno de los campos de formulario: "Web Link" es no está debidamente saneado y un usuario malicioso (que tiene derechos de carga de documentos) puede usarlo para entregar la carga útil de JavaScript. Por ejemplo, si usa la siguiente carga útil: " accesskey="x" onclick="alert(1)" x=", el contenido se guardará dentro de la base de datos sin ningún control. Y luego, una vez que regrese a la página de documentos resumen, al hacer clic en el "Web Link" del archivo recién creado, se creará una nueva pestaña vacía, pero en la pestaña inicial aparecerá la ventana emergente "1"
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-12-22 CVE Reserved
- 2021-03-03 CVE Published
- 2024-08-03 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://github.com/glpi-project/glpi/releases/tag/9.5.4 | Release Notes | |
https://github.com/glpi-project/glpi/security/advisories/GHSA-c7f6-3mr7-3rq2 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Glpi-project Search vendor "Glpi-project" | Glpi Search vendor "Glpi-project" for product "Glpi" | < 9.5.4 Search vendor "Glpi-project" for product "Glpi" and version " < 9.5.4" | - |
Affected
|