id: CVE-2021-36646 info: name: KodExplorer - Cross-Site Scripting author: ritikchaddha severity: medium description: | KodExplorer is susceptible to a reflected cross-site scripting (XSS) vulnerability in the file view functionality.The vulnerability exists in app/template/api/view.html where user-supplied input in the 'path' parameter is directly echoed without proper sanitization.This allows attackers to inject malicious JavaScript code that executes in the context of the user's browser. remediation: | Upgrade to the latest version of KodExplorer that addresses this vulnerability. Implement proper input validation and output encoding for user-supplied data. reference: - https://github.com/kalcaddle/KodExplorer/issues/482 - https://nvd.nist.gov/vuln/detail/CVE-2021-36646 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2021-36646 cwe-id: CWE-79 metadata: max-request: 2 vendor: kalcaddle product: kod-explorer fofa-query: app="Powered-by-KodExplorer" tags: cve,cve2021,xss,kodexplorer flow: http(1) && http(2) http: - method: GET path: - "{{BaseURL}}" matchers: - type: word part: body words: - "KodExplorer" internal: true - method: GET path: - "{{BaseURL}}/index.php?explorer/fileView&path=" matchers-condition: and matchers: - type: word part: body words: - "" - type: word part: content_type words: - text/html - type: status status: - 200 # digest: 4a0a00473045022100de1a956ed4a1733ff3ada409b4f39926d0763d1ec192aa362ba5894f7d7bb0da02202443953ae3ec2096b01e6c5e6da611505b1580f06d784db5500941e9106eea0f:922c64590222798bb761d5b6d8e72950