CVE-2021-44082

textpattern 4.8.7 is vulnerable to Cross Site Scripting (XSS) via /textpattern/index.php,Body. A remote and unauthenticated attacker can use XSS to trigger remote code execution by uploading a webshell. To do so they must first steal the CSRF token before submitting a file upload request.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:textpattern:textpattern:4.8.7:*:*:*:*:*:*:*

History

21 Nov 2024, 06:30

Type Values Removed Values Added
References () https://pentest.co.uk/labs/leveraging-xss-to-get-rce-in-textpattern/ - Exploit, Third Party Advisory () https://pentest.co.uk/labs/leveraging-xss-to-get-rce-in-textpattern/ - Exploit, Third Party Advisory
References () https://www.cornerpirate.com - Not Applicable () https://www.cornerpirate.com - Not Applicable
References () https://www.pentest.co.uk - Third Party Advisory () https://www.pentest.co.uk - Third Party Advisory

Information

Published : 2022-03-29 23:15

Updated : 2024-11-21 06:30


NVD link : CVE-2021-44082

Mitre link : CVE-2021-44082

CVE.ORG link : CVE-2021-44082


JSON object : View

Products Affected

textpattern

  • textpattern
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')