header-logo
Suggest Exploit
vendor:
Cloudron
by:
Akıner Kısa
6,1
CVSS
MEDIUM
Cross Site Scripting (Reflected)
79
CWE
Product Name: Cloudron
Affected Version From: 6.2
Affected Version To: 6.3
Patch Exists: YES
Related CWE: CVE-2021-40868
CPE: a:cloudron:cloudron:6.2
Metasploit: N/A
Other Scripts: N/A
Tags: cve,cve2021,xss,cloudron,packetstorm
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Nuclei Metadata: {'max-request': 1, 'vendor': 'cloudron', 'product': 'cloudron'}
Platforms Tested: None
2021

Cloudron 6.2 – ‘returnTo ‘ Cross Site Scripting (Reflected)

In Cloudron 6.2, the returnTo parameter on the login page is vulnerable to cross-site scripting.

Mitigation:

The application should validate the 'returnTo' parameter and filter out any malicious JavaScript code.
Source

Exploit-DB raw data:

# Exploit Title: Cloudron 6.2 - 'returnTo ' Cross Site Scripting (Reflected)
# Date: 10.06.2021
# Exploit Author: Akıner Kısa
# Vendor Homepage: https://cloudron.io
# Software Link: https://www.cloudron.io/get.html
# Version: 6.3 >
# CVE : CVE-2021-40868


Proof of Concept:

1. Go to https://localhost/login.html?returnTo=
2. Type your payload after returnTo=
3. Fill in the login information and press the sign in button.