First published: Thu Jan 21 2021(Updated: )
Revive Adserver before 5.1.0 is vulnerable to a reflected cross-site scripting (XSS) vulnerability via the publicly accessible afr.php delivery script. While this issue was previously addressed in modern browsers as CVE-2020-8115, some older browsers (e.g., IE10) that do not automatically URL encode parameters were still vulnerable.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Revive-adserver Revive Adserver | <5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22872 is a vulnerability in Revive Adserver before version 5.1.0 that allows for reflected cross-site scripting (XSS) attacks.
CVE-2021-22872 affects Revive Adserver versions prior to 5.1.0, allowing attackers to execute arbitrary script code in the context of a victim's browser.
The severity of CVE-2021-22872 is medium, with a CVSS score of 6.1.
To fix the CVE-2021-22872 vulnerability, it is recommended to upgrade Revive Adserver to version 5.1.0 or later.
Yes, here are some references for CVE-2021-22872: [Reference 1](http://packetstormsecurity.com/files/161070/Revive-Adserver-5.0.5-Cross-Site-Scripting-Open-Redirect.html), [Reference 2](http://seclists.org/fulldisclosure/2021/Jan/60), [Reference 3](https://github.com/revive-adserver/revive-adserver/commit/00fdb8d0e).