vendor:
Jenzabar
by:
y0ung_dst
6.1
CVSS
MEDIUM
Reflected XSS
79
CWE
Product Name: Jenzabar
Affected Version From: v9.2.0
Affected Version To: v9.2.2
Patch Exists: YES
Related CWE: CVE-2021-26723
CPE: a:jenzabar:jenzabar:9.2.0
Tags: packetstorm,cve,cve2021,jenzabar,xss
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Nuclei References:
http://packetstormsecurity.com/files/161303/Jenzabar-9.2.2-Cross-Site-Scripting.html, https://gist.github.com/Y0ung-DST/d1b6b65be6248b0ffc2b2f2120deb205, https://jenzabar.com/blog, https://y0ungdst.medium.com/xss-in-jenzabar-cve-2021-26723-a0749231328, https://nvd.nist.gov/vuln/detail/CVE-2021-26723
Nuclei Metadata: {'max-request': 1, 'vendor': 'jenzabar', 'product': 'jenzabar'}
Platforms Tested: Windows 10
2021
Jenzabar 9.2.2 – ‘query’ Reflected XSS
A Reflected Cross-site scripting (XSS) vulnerability in Jenzabar v9.2.0 through 9.2.2. Attacker could inject web script or HTML via the query parameter (aka the Search Field). To exploit the vulnerability, someone must click the link.
Mitigation:
Sanitize user input and validate against a whitelist of allowed characters or use output encoding to prevent the execution of arbitrary code.