CVE-2021-32852
CVSS V2 None
CVSS V3 None
Description
Countly, a product analytics solution, is vulnerable to cross-site scripting prior to version 21.11 of the community edition. The victim must follow a malicious link or be redirected there from malicious web site. The attacker must have an account or be able to create one. This issue is patched in version 21.11.
Overview
- CVE ID
- CVE-2021-32852
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-02-20T22:15:11
- Last Modified Date
- 2023-03-06T04:35:57
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:count:countly_server:*:*:*:*:community:*:*:* | 1 | OR | 21.11 |
References
Reference URL | Reference Tags |
---|---|
https://github.com/Countly/countly-server/blob/6b90bb775e747cabe46fe197c6a6989acc6c3417/frontend/express/app.js#L1112 | Third Party Advisory |
https://github.com/Countly/countly-server/blob/6b90bb775e747cabe46fe197c6a6989acc6c3417/frontend/express/views/reset.html#L95 | Third Party Advisory |
https://github.com/Countly/countly-server/releases/tag/v21.11 | Release Notes |
https://securitylab.github.com/advisories/GHSL-2021-104-countly-server/ | Exploit Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-32852 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32852 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 08:00:31 | Added to TrackCVE | |||
2023-04-17 08:00:33 | Weakness Enumeration | new |