Vulnerability Description
Thruk 2.40-2 allows /thruk/#cgi-bin/extinfo.cgi?type=2&host={HOSTNAME]&service={SERVICENAME]&backend={BACKEND] Reflected XSS via the host or service parameter. An attacker could inject arbitrary JavaScript into extinfo.cgi. The malicious payload would be triggered every time an authenticated user browses the page containing it.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Thruk | Thruk | 2.40-2 |
Related Weaknesses (CWE)
References
- https://www.gruppotim.it/redteamExploitThird Party Advisory
- https://www.thruk.org/changelog.htmlRelease NotesVendor Advisory
- https://www.gruppotim.it/redteamExploitThird Party Advisory
- https://www.thruk.org/changelog.htmlRelease NotesVendor Advisory
FAQ
What is CVE-2021-35489?
CVE-2021-35489 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Thruk 2.40-2 allows /thruk/#cgi-bin/extinfo.cgi?type=2&host={HOSTNAME]&service={SERVICENAME]&backend={BACKEND] Reflected XSS via the host or service parameter. An attacker could inject arbitrary JavaS...
How severe is CVE-2021-35489?
CVE-2021-35489 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-35489?
Check the references section above for vendor advisories and patch information. Affected products include: Thruk Thruk.