CVE-2021-44912
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
In XE 1.116, when uploading the Normal button, there is no restriction on the file suffix, which leads to any file uploading to the files directory. Since .htaccess only restricts the PHP type, uploading HTML-type files leads to stored XSS vulnerabilities. If the .htaccess configuration is improper, for example before the XE 1.11.2 version, you can upload the PHP type file to GETSHELL.
En XE versión 1.116, cuando es subido el botón Normal, no se presenta restricción en el sufijo del archivo, lo que conlleva a que cualquier archivo se suba al directorio de archivos. Dado que .htaccess sólo restringe el tipo de PHP, la subida de archivos de tipo HTML conlleva vulnerabilidades XSS almacenadas. Si la configuración de .htaccess es inadecuada, por ejemplo versiones anteriores a 1.11.2 de XE, puede subirse el archivo de tipo PHP a GETSHELL
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-12-13 CVE Reserved
- 2022-02-09 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/xpressengine/xe-core/issues/2433 | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Xpressengine Search vendor "Xpressengine" | Xpressengine Search vendor "Xpressengine" for product "Xpressengine" | < 1.11.6 Search vendor "Xpressengine" for product "Xpressengine" and version " < 1.11.6" | - |
Affected
|