Vulnerability Details : CVE-2021-32772
Poddycast is a podcast app made with Electron. Prior to version 0.8.1, an attacker can create a podcast or episode with malicious characters and execute commands on the client machine. The application does not clean the HTML characters of the podcast information obtained from the Feed, which allows the injection of HTML and JS code (cross-site scripting). Being an application made in electron, cross-site scripting can be scaled to remote code execution, making it possible to execute commands on the machine where the application is running. The vulnerability is patched in Poddycast version 0.8.1.
Vulnerability category: Cross site scripting (XSS)Execute code
Products affected by CVE-2021-32772
- cpe:2.3:a:electronjs:poddycast:0.8.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-32772
0.87%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-32772
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
GitHub, Inc. |
CWE ids for CVE-2021-32772
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: security-advisories@github.com (Secondary)
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-32772
-
https://github.com/MrChuckomo/poddycast/blob/8d31daa5cee04a389ec35f974959ea3fe4638be9/app/js/helper/helper_entries.js#L80
poddycast/helper_entries.js at 8d31daa5cee04a389ec35f974959ea3fe4638be9 · MrChuckomo/poddycast · GitHubThird Party Advisory
-
https://github.com/MrChuckomo/poddycast/blob/8d31daa5cee04a389ec35f974959ea3fe4638be9/app/js/favorite.js#L4-L14
poddycast/favorite.js at 8d31daa5cee04a389ec35f974959ea3fe4638be9 · MrChuckomo/poddycast · GitHubThird Party Advisory
-
https://github.com/MrChuckomo/poddycast/blob/8d31daa5cee04a389ec35f974959ea3fe4638be9/app/js/feed.js#L285
poddycast/feed.js at 8d31daa5cee04a389ec35f974959ea3fe4638be9 · MrChuckomo/poddycast · GitHubThird Party Advisory
-
https://github.com/MrChuckomo/poddycast/security/advisories/GHSA-wjmh-9fj2-rqh6
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in helper_entries · Advisory · MrChuckomo/poddycast · GitHubThird Party Advisory
Jump to