{"containers":{"cna":{"affected":[{"product":"TopEase","vendor":"Business-DNA Solutions GmbH","versions":[{"lessThanOrEqual":"7.1.27","status":"affected","version":"unspecified","versionType":"custom"}]}],"credits":[{"lang":"en","value":"SIX Group Services AG, Cyber Controls"}],"descriptions":[{"lang":"en","value":"Persistent Cross Site Scripting in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 via the Search Functionality allows authenticated users with Object Modification privileges to inject arbitrary HTML and JavaScript in object attributes, which is then rendered in the Search Functionality, to alter the intended functionality and steal cookies, the latter allowing for account takeover."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.3,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Cross-site Scripting (XSS)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-11-30T11:28:11.000Z","orgId":"455daabc-a392-441d-aa46-37d35189897c","shortName":"NCSC.ch"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://confluence.topease.ch/confluence/display/DOC/Release+Notes"}],"source":{"discovery":"EXTERNAL"},"title":"Stored XSS in Search Function in TopEase","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"vulnerability@ncsc.ch","ID":"CVE-2021-42119","STATE":"PUBLIC","TITLE":"Stored XSS in Search Function in TopEase"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"TopEase","version":{"version_data":[{"version_affected":"<=","version_value":"7.1.27"}]}}]},"vendor_name":"Business-DNA Solutions GmbH"}]}},"credit":[{"lang":"eng","value":"SIX Group Services AG, Cyber Controls"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Persistent Cross Site Scripting in Web Applications operating on Business-DNA Solutions GmbH’s TopEase® Platform Version <= 7.1.27 via the Search Functionality allows authenticated users with Object Modification privileges to inject arbitrary HTML and JavaScript in object attributes, which is then rendered in the Search Functionality, to alter the intended functionality and steal cookies, the latter allowing for account takeover."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.3,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-site Scripting (XSS)"}]}]},"references":{"reference_data":[{"name":"https://confluence.topease.ch/confluence/display/DOC/Release+Notes","refsource":"CONFIRM","url":"https://confluence.topease.ch/confluence/display/DOC/Release+Notes"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T03:30:37.901Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://confluence.topease.ch/confluence/display/DOC/Release+Notes"}]}]},"cveMetadata":{"assignerOrgId":"455daabc-a392-441d-aa46-37d35189897c","assignerShortName":"NCSC.ch","cveId":"CVE-2021-42119","datePublished":"2021-11-30T11:28:11.000Z","dateReserved":"2021-10-08T00:00:00.000Z","dateUpdated":"2024-08-04T03:30:37.901Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}