Vulnerability Description
Workerman-ThinkPHP-Redis (last update Mar 16, 2018) is affected by a Cross Site Scripting (XSS) vulnerability. In file Controller.class.php, the exit function will terminate the script and print the message to the user. The message will contain $_GET{C('VAR_JSONP_HANDLER')] then there is a XSS vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Workerman-Thinkphp-Redis Project | Workerman-Thinkphp-Redis | < 2018-03-16 |
Related Weaknesses (CWE)
References
- https://github.com/happyliu2014/Workerman-ThinkPHP-Redis/issues/1ExploitThird Party Advisory
- https://github.com/happyliu2014/Workerman-ThinkPHP-Redis/issues/1ExploitThird Party Advisory
FAQ
What is CVE-2021-43697?
CVE-2021-43697 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Workerman-ThinkPHP-Redis (last update Mar 16, 2018) is affected by a Cross Site Scripting (XSS) vulnerability. In file Controller.class.php, the exit function will terminate the script and print the m...
How severe is CVE-2021-43697?
CVE-2021-43697 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-43697?
Check the references section above for vendor advisories and patch information. Affected products include: Workerman-Thinkphp-Redis Project Workerman-Thinkphp-Redis.