Vulnerability Details : CVE-2021-46872
An issue was discovered in Nim before 1.6.2. The RST module of the Nim language stdlib, as used in NimForum and other products, permits the javascript: URI scheme and thus can lead to XSS in some applications. (Nim versions 1.6.2 and later are fixed; there may be backports of the fix to some earlier versions. NimForum 2.2.0 is fixed.)
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2021-46872
- cpe:2.3:a:nim-lang:nim:*:*:*:*:*:*:*:*
- cpe:2.3:a:nim-lang:nimforum:*:*:*:*:*:nim:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-46872
0.10%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 40 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-46872
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
2.8
|
2.7
|
NIST |
CWE ids for CVE-2021-46872
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-46872
-
https://github.com/nim-lang/Nim/pull/19134
fixes a possible 'javascript:' protocol exploit [backport:1.0] by Araq · Pull Request #19134 · nim-lang/Nim · GitHubPatch;Third Party Advisory
-
https://github.com/nim-lang/Nim/commit/46275126b89218e64844eee169e8ced05dd0e2d7
fixes a possible 'javascript:' protocol exploit [backport:1.0] (#19134) · nim-lang/Nim@4627512 · GitHubPatch;Third Party Advisory
-
https://github.com/nim-lang/Nim/compare/v1.6.0...v1.6.2
Comparing v1.6.0...v1.6.2 · nim-lang/Nim · GitHubThird Party Advisory
-
https://github.com/nim-lang/nimforum
GitHub - nim-lang/nimforum: Lightweight alternative to Discourse written in NimThird Party Advisory
-
https://forum.nim-lang.org/t/8852
NimForum 2.2.0 - Fixes a big CVE! - Nim forumIssue Tracking;Vendor Advisory
Jump to