CVE-2021-43697

Workerman-ThinkPHP-Redis (last update Mar 16, 2018) is affected by a Cross Site Scripting (XSS) vulnerability. In file Controller.class.php, the exit function will terminate the script and print the message to the user. The message will contain $_GET{C('VAR_JSONP_HANDLER')] then there is a XSS vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:workerman-thinkphp-redis_project:workerman-thinkphp-redis:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:29

Type Values Removed Values Added
References () https://github.com/happyliu2014/Workerman-ThinkPHP-Redis/issues/1 - Exploit, Third Party Advisory () https://github.com/happyliu2014/Workerman-ThinkPHP-Redis/issues/1 - Exploit, Third Party Advisory

Information

Published : 2021-11-29 13:15

Updated : 2024-11-21 06:29


NVD link : CVE-2021-43697

Mitre link : CVE-2021-43697

CVE.ORG link : CVE-2021-43697


JSON object : View

Products Affected

workerman-thinkphp-redis_project

  • workerman-thinkphp-redis
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')