Files
CVEs-PoC/2021/CVE-2021-4035.md
T
2024-05-25 21:48:12 +02:00

20 lines
945 B
Markdown

### [CVE-2021-4035](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4035)
![](https://img.shields.io/static/v1?label=Product&message=Wocu%20Monitoring&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0.27%3C%2048.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen)
### Description
A stored cross site scripting have been identified at the comments in the report creation due to an obsolote version of tinymce editor. In order to exploit this vulnerability, the attackers needs an account with enough privileges to view and edit reports.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xalwayslucky/log4j-polkit-poc
- https://github.com/ARPSyndicate/cvemon
- https://github.com/fkie-cad/nvd-json-data-feeds