// For flags

CVE-2021-32793

Stored XSS Vulnerability in the Pi-hole Webinterface

Severity Score

4.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Pi-hole's Web interface provides a central location to manage a Pi-hole instance and review performance statistics. Prior to Pi-hole Web interface version 5.5.1, the function to add domains to blocklists or allowlists is vulnerable to a stored cross-site-scripting vulnerability. User input added as a wildcard domain to a blocklist or allowlist is unfiltered in the web interface. Since the payload is stored permanently as a wildcard domain, this is a persistent XSS vulnerability. A remote attacker can therefore attack administrative user accounts through client-side attacks. Pi-hole Web Interface version 5.5.1 contains a patch for this vulnerability.

La interfaz web de Pi-hole proporciona una ubicación central para administrar una instancia de Pi-hole y revisar las estadísticas de rendimiento. Anterior a versión 5.5.1 de la interfaz web de Pi-hole, la función para añadir dominios a las listas de bloqueo o a las listas de permitidos es vulnerable a una vulnerabilidad de tipo cross-site-scripting almacenado. La entrada del usuario añadida como dominio comodín a una lista de bloqueo o lista permitida no se filtra en la interfaz web. Dado que la carga útil es almacenado permanentemente como dominio comodín, se trata de una vulnerabilidad de tipo XSS persistente. Por lo tanto, un atacante remoto puede atacar cuentas de usuario administrativas mediante ataques del lado del cliente. La versión 5.5.1 de la interfaz web de Pi-hole contiene un parche para esta vulnerabilidad

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-05-12 CVE Reserved
  • 2021-08-04 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Pi-hole
Search vendor "Pi-hole"
Pi-hole
Search vendor "Pi-hole" for product "Pi-hole"
< 5.5.1
Search vendor "Pi-hole" for product "Pi-hole" and version " < 5.5.1"
-
Affected