CVE-2021–43712 Stored XSS. How I got my first CVE

Varshil Desai
1 min readMay 6, 2022

--

Hello, This is my first CVE Write-up, and also Personally the first CVE id I’ve received.

You can read it on the official website here: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43712

Vulnerable Software was Employee Daily Task Management System.

Vulnerability Description: Stored XSS in Add New Employee Form in System Allows Remote Attacker to Inject/Store Arbitrary Code via the Name Field.

Payload used: <form><a href=”javascript:\u0061lert&#x28;1&#x29;”>X

Steps to reproduce:
1- Go to http://victim.com login as Admin or Manager
2- To add a new employee or task fill up some details and in the Name field enter the payload given above.
3- It will be stored in the database and whenever any user clicks on the name or try to navigate to the management field the XSS will be executed.

# Exploit Author: Varshil Patel (KnoxPro)
# Version: 1.0
# Tested on: Windows 10, 11

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Varshil Desai
Varshil Desai

Written by Varshil Desai

A Passionate Cybersecurity professional with experience. Security Analyst, Bug Bounty hunter with interest in Threat & Vulnerability domain.

No responses yet

Write a response