Vulnerability Description
An XSS issue was discovered in SmartFoxServer 2.17.0. Input passed to the AdminTool console is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML code in a user's browser session in context of an affected site.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Smartfoxserver | Smartfoxserver | 2.17.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/161335/SmartFoxServer-2X-2.17.0-God-Mode-CoExploitThird Party AdvisoryVDB Entry
- https://www.smartfoxserver.comProduct
- https://www.zeroscience.mk/en/vulnerabilities/ExploitThird Party Advisory
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5626.phpExploitThird Party Advisory
- http://packetstormsecurity.com/files/161335/SmartFoxServer-2X-2.17.0-God-Mode-CoExploitThird Party AdvisoryVDB Entry
- https://www.smartfoxserver.comProduct
- https://www.zeroscience.mk/en/vulnerabilities/ExploitThird Party Advisory
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5626.phpExploitThird Party Advisory
FAQ
What is CVE-2021-26549?
CVE-2021-26549 is a vulnerability with a CVSS score of 5.4 (MEDIUM). An XSS issue was discovered in SmartFoxServer 2.17.0. Input passed to the AdminTool console is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML...
How severe is CVE-2021-26549?
CVE-2021-26549 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-26549?
Check the references section above for vendor advisories and patch information. Affected products include: Smartfoxserver Smartfoxserver.