CVE-2021-43697

Workerman-ThinkPHP-Redis (last update Mar 16, 2018) is affected by a Cross Site Scripting (XSS) vulnerability. In file Controller.class.php, the exit function will terminate the script and print the message to the user. The message will contain $_GET{C('VAR_JSONP_HANDLER')] then there is a XSS vulnerability.
References
Link Resource
https://github.com/happyliu2014/Workerman-ThinkPHP-Redis/issues/1 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:workerman-thinkphp-redis_project:workerman-thinkphp-redis:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-11-29 13:15

Updated : 2024-02-28 18:48


NVD link : CVE-2021-43697

Mitre link : CVE-2021-43697

CVE.ORG link : CVE-2021-43697


JSON object : View

Products Affected

workerman-thinkphp-redis_project

  • workerman-thinkphp-redis
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')