CVE-2021-32853: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
(updated )
Erxes, an experience operating system (XOS) with a set of plugins, is vulnerable to cross-site scripting in versions 0.22.3 and prior. This results in client-side code execution. The victim must follow a malicious link or be redirected there from malicious web site. There are no known patches.
References
- github.com/advisories/GHSA-g9ph-r9hc-34r8
- github.com/erxes/erxes/blob/f131b49add72032650d483f044d00658908aaf4a/widgets/server/index.ts
- github.com/erxes/erxes/blob/f131b49add72032650d483f044d00658908aaf4a/widgets/server/views/widget.ejs
- nvd.nist.gov/vuln/detail/CVE-2021-32853
- securitylab.github.com/advisories/GHSL-2021-103-erxes/
Detect and mitigate CVE-2021-32853 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →