AS_Redis is an AntSword plugin for Redis. The Redis Manage plugin for AntSword prior to version 0.5 is vulnerable to Self-XSS due to due to insufficient input validation and sanitization via redis server configuration. Self-XSS in the plugin configuration leads to code execution. This issue is patched in version 0.5.
References
Link | Resource |
---|---|
https://github.com/AntSword-Store/AS_Redis/issues/1 | Exploit Issue Tracking Third Party Advisory |
https://github.com/Medicean/AS_Redis/security/advisories/GHSA-j8j6-f829-w425 | Third Party Advisory |
https://mp.weixin.qq.com/s/yjuG6DLT_bSRnpggPj21Xw | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-10-26 14:15
Updated : 2021-10-27 20:27
NVD link : CVE-2021-41172
Mitre link : CVE-2021-41172
CVE.ORG link : CVE-2021-41172
JSON object : View
Products Affected
antsword_redis_project
- antsword_redis
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')