Monkshu is an enterprise application server for mobile apps (iOS and Android), responsive HTML 5 apps, and JSON API services. In version 2.90 and earlier, there is a reflected cross-site scripting vulnerability in frontend HTTP server. The attacker can send in a carefully crafted URL along with a known bug in the server which will cause a 500 error, and the response will then embed the URL provided by the hacker. The impact is moderate as the hacker must also be able to craft an HTTP request which should cause a 500 server error. None such requests are known as this point. The issue is patched in version 2.95. As a workaround, one may use a disk caching plugin.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2021-08-02T22:35:11
Updated: 2024-08-03T23:33:55.921Z
Reserved: 2021-05-12T00:00:00
Link: CVE-2021-32812
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-08-02T23:15:08.020
Modified: 2024-11-21T06:07:47.983
Link: CVE-2021-32812
Redhat
No data.