An issue was discovered in COINS Construction Cloud 11.12. In several locations throughout the application, JavaScript code is passed as a URL parameter. Attackers can trivially alter this code to cause malicious behaviour. The application is therefore vulnerable to reflected XSS via malicious URLs.
References
Link | Resource |
---|---|
https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview | Patch Product Vendor Advisory |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-053.txt | Exploit Third Party Advisory |
https://www.syss.de/pentest-blog/multiple-schwachstellen-im-coins-construction-cloud-erp-syss-2021-028/-029/-030/-031/-051/-052/-053 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-01-24T19:58:24
Updated: 2022-01-24T19:58:24
Reserved: 2021-12-16T00:00:00
Link: CVE-2021-45224
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-01-24T20:15:08.370
Modified: 2023-10-18T17:24:52.747
Link: CVE-2021-45224
JSON object: View
Redhat Information
No data.
CWE