CVE-2021-44911
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
XE before 1.11.6 is vulnerable to Unrestricted file upload via modules/menu/menu.admin.controller.php. When uploading the Mouse over button and When selected button, there is no restriction on the file suffix, which leads to any file uploading to the files directory. Since .htaccess only restricts the PHP type, uploading HTML-type files leads to stored XSS vulnerabilities.
XE versiones anteriores a 1.11.6, es vulnerable a una carga de archivos sin restricciones por medio del archivo modules/menu/menu.admin.controller.php. Cuando es subido el botón Mouse over y When selected, no se presenta restricción en el sufijo del archivo, lo que conlleva a que cualquier archivo se suba al directorio de archivos. Dado que .htaccess sólo restringe el tipo de PHP, la subida de archivos de tipo HTML conlleva a vulnerabilidades de tipo XSS almacenadas
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-12-13 CVE Reserved
- 2022-02-09 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/xpressengine/xe-core/issues/2434 | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Xpressengine Search vendor "Xpressengine" | Xpressengine Search vendor "Xpressengine" for product "Xpressengine" | < 1.11.6 Search vendor "Xpressengine" for product "Xpressengine" and version " < 1.11.6" | - |
Affected
|