CVE-2021-33570

Postbird 0.8.4 allows stored XSS via the onerror attribute of an IMG element in any PostgreSQL database table. This can result in reading local files via vectors involving XMLHttpRequest and open of a file:/// URL, or discovering PostgreSQL passwords via vectors involving Window.localStorage and savedConnections.
References
Link Resource
http://packetstormsecurity.com/files/162831/Postbird-0.8.4-Cross-Site-Scripting-Local-File-Inclusion.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/162872/Postbird-0.8.4-XSS-LFI-Insecure-Data-Storage.html Third Party Advisory VDB Entry
https://github.com/Paxa/postbird/issues/132 Issue Tracking Third Party Advisory
https://github.com/Paxa/postbird/issues/133 Issue Tracking Third Party Advisory
https://github.com/Paxa/postbird/issues/134 Issue Tracking Third Party Advisory
https://github.com/Tridentsec-io/postbird Exploit Third Party Advisory
https://tridentsec.io/blogs/postbird-cve-2021-33570/ Broken Link Third Party Advisory URL Repurposed
https://www.exploit-db.com/exploits/49910 Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:postbird_project:postbird:0.8.4:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-05-25 22:15

Updated : 2024-02-14 01:17


NVD link : CVE-2021-33570

Mitre link : CVE-2021-33570

CVE.ORG link : CVE-2021-33570


JSON object : View

Products Affected

postbird_project

  • postbird
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')