Countly, a product analytics solution, is vulnerable to cross-site scripting prior to version 21.11 of the community edition. The victim must follow a malicious link or be redirected there from malicious web site. The attacker must have an account or be able to create one. This issue is patched in version 21.11.
References
| Link | Resource |
|---|---|
| https://github.com/Countly/countly-server/blob/6b90bb775e747cabe46fe197c6a6989acc6c3417/frontend/express/app.js#L1112 | Third Party Advisory |
| https://github.com/Countly/countly-server/blob/6b90bb775e747cabe46fe197c6a6989acc6c3417/frontend/express/views/reset.html#L95 | Third Party Advisory |
| https://github.com/Countly/countly-server/releases/tag/v21.11 | Release Notes |
| https://securitylab.github.com/advisories/GHSL-2021-104-countly-server/ | Exploit Third Party Advisory |
| https://github.com/Countly/countly-server/blob/6b90bb775e747cabe46fe197c6a6989acc6c3417/frontend/express/app.js#L1112 | Third Party Advisory |
| https://github.com/Countly/countly-server/blob/6b90bb775e747cabe46fe197c6a6989acc6c3417/frontend/express/views/reset.html#L95 | Third Party Advisory |
| https://github.com/Countly/countly-server/releases/tag/v21.11 | Release Notes |
| https://securitylab.github.com/advisories/GHSL-2021-104-countly-server/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:07
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Countly/countly-server/blob/6b90bb775e747cabe46fe197c6a6989acc6c3417/frontend/express/app.js#L1112 - Third Party Advisory | |
| References | () https://github.com/Countly/countly-server/blob/6b90bb775e747cabe46fe197c6a6989acc6c3417/frontend/express/views/reset.html#L95 - Third Party Advisory | |
| References | () https://github.com/Countly/countly-server/releases/tag/v21.11 - Release Notes | |
| References | () https://securitylab.github.com/advisories/GHSL-2021-104-countly-server/ - Exploit, Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
06 Mar 2023, 04:35
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) https://github.com/Countly/countly-server/blob/6b90bb775e747cabe46fe197c6a6989acc6c3417/frontend/express/app.js#L1112 - Third Party Advisory | |
| References | (MISC) https://github.com/Countly/countly-server/blob/6b90bb775e747cabe46fe197c6a6989acc6c3417/frontend/express/views/reset.html#L95 - Third Party Advisory |
02 Mar 2023, 16:38
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.0 |
| CPE | cpe:2.3:a:count:countly_server:*:*:*:*:community:*:*:* | |
| References | (CONFIRM) https://securitylab.github.com/advisories/GHSL-2021-104-countly-server/ - Exploit, Third Party Advisory | |
| References | (MISC) https://github.com/Countly/countly-server/releases/tag/v21.11 - Release Notes | |
| References | (MISC) https://github.com/Countly/countly-server/blob/6b90bb775e747cabe46fe197c6a6989acc6c3417/frontend/express/app.js#L1112 - Exploit, Issue Tracking, Patch | |
| References | (MISC) https://github.com/Countly/countly-server/blob/6b90bb775e747cabe46fe197c6a6989acc6c3417/frontend/express/views/reset.html#L95 - Exploit, Issue Tracking | |
| CWE | CWE-79 |
21 Feb 2023, 14:50
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-02-20 22:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32852
Mitre link : CVE-2021-32852
CVE.ORG link : CVE-2021-32852
JSON object : View
Products Affected
count
- countly_server
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
