Postbird 0.8.4 allows stored XSS via the onerror attribute of an IMG element in any PostgreSQL database table. This can result in reading local files via vectors involving XMLHttpRequest and open of a file:/// URL, or discovering PostgreSQL passwords via vectors involving Window.localStorage and savedConnections.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/162831/Postbird-0.8.4-Cross-Site-Scripting-Local-File-Inclusion.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/162872/Postbird-0.8.4-XSS-LFI-Insecure-Data-Storage.html | Third Party Advisory VDB Entry |
https://github.com/Paxa/postbird/issues/132 | Issue Tracking Third Party Advisory |
https://github.com/Paxa/postbird/issues/133 | Issue Tracking Third Party Advisory |
https://github.com/Paxa/postbird/issues/134 | Issue Tracking Third Party Advisory |
https://github.com/Tridentsec-io/postbird | Exploit Third Party Advisory |
https://tridentsec.io/blogs/postbird-cve-2021-33570/ | Broken Link Third Party Advisory URL Repurposed |
https://www.exploit-db.com/exploits/49910 | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2021-05-25 22:15
Updated : 2024-02-14 01:17
NVD link : CVE-2021-33570
Mitre link : CVE-2021-33570
CVE.ORG link : CVE-2021-33570
JSON object : View
Products Affected
postbird_project
- postbird
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')