Vulnerability Description
In ARCHIBUS Web Central 21.3.3.815 (a version from 2014), XSS occurs in /archibus/dwr/call/plaincall/workflow.runWorkflowRule.dwr because the data received as input from clients is re-included within the HTTP response returned by the application without adequate validation. In this way, if HTML code or client-side executable code (e.g., Javascript) is entered as input, the expected execution flow could be altered. This is fixed in all recent versions, such as version 26. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. Version 21.3 was officially de-supported by the end of 2020
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Archibus | Web Central | 21.3.3.815 |
Related Weaknesses (CWE)
References
- https://www.gruppotim.it/redteamThird Party Advisory
- https://www.gruppotim.it/redteamThird Party Advisory
FAQ
What is CVE-2021-41555?
CVE-2021-41555 is a vulnerability with a CVSS score of 6.1 (MEDIUM). In ARCHIBUS Web Central 21.3.3.815 (a version from 2014), XSS occurs in /archibus/dwr/call/plaincall/workflow.runWorkflowRule.dwr because the data received as input from clients is re-included within ...
How severe is CVE-2021-41555?
CVE-2021-41555 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-41555?
Check the references section above for vendor advisories and patch information. Affected products include: Archibus Web Central.