An issue was discovered in COINS Construction Cloud 11.12. In several locations throughout the application, JavaScript code is passed as a URL parameter. Attackers can trivially alter this code to cause malicious behaviour. The application is therefore vulnerable to reflected XSS via malicious URLs.
References
Link | Resource |
---|---|
https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview | Patch Product Vendor Advisory |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-053.txt | Exploit Third Party Advisory |
https://www.syss.de/pentest-blog/multiple-schwachstellen-im-coins-construction-cloud-erp-syss-2021-028/-029/-030/-031/-051/-052/-053 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-01-24 20:15
Updated : 2023-10-18 17:24
NVD link : CVE-2021-45224
Mitre link : CVE-2021-45224
CVE.ORG link : CVE-2021-45224
JSON object : View
Products Affected
coins-global
- coins_construction_cloud
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')