<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2021-21029_Adobe_Magento_Commerce_XSS%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2021-21029 Adobe Magento Commerce XSS漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2021-21029_Adobe_Magento_Commerce_XSS%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2021-21029_Adobe_Magento_Commerce_XSS%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-19T15:20:03Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2021-21029_Adobe_Magento_Commerce_XSS%E6%BC%8F%E6%B4%9E&amp;diff=3634&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;&lt;pre&gt; SEC Consult Vulnerability Lab Security Advisory &lt; 20210210-0 &gt; =======================================================================               title: Reflected Cro...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2021-21029_Adobe_Magento_Commerce_XSS%E6%BC%8F%E6%B4%9E&amp;diff=3634&amp;oldid=prev"/>
		<updated>2021-05-30T02:58:47Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;pre&amp;gt; SEC Consult Vulnerability Lab Security Advisory &amp;lt; 20210210-0 &amp;gt; =======================================================================               title: Reflected Cro...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
SEC Consult Vulnerability Lab Security Advisory &amp;lt; 20210210-0 &amp;gt;&lt;br /&gt;
=======================================================================&lt;br /&gt;
              title: Reflected Cross-Site Scripting (XSS)&lt;br /&gt;
            product: Adobe Magento Commerce&lt;br /&gt;
 vulnerable version: &amp;lt; 2.4.2&lt;br /&gt;
      fixed version: 2.4.2&lt;br /&gt;
         CVE number: CVE-2021-21029&lt;br /&gt;
             impact: Medium&lt;br /&gt;
           homepage: https://magento.com/&lt;br /&gt;
              found: 2020-06-29&lt;br /&gt;
                 by: Natsasit Jirathammanuwat (Office Thailand)&lt;br /&gt;
                     SEC Consult Vulnerability Lab&lt;br /&gt;
&lt;br /&gt;
                     An integrated part of SEC Consult, an Atos company&lt;br /&gt;
                     Europe | Asia | North America&lt;br /&gt;
&lt;br /&gt;
                     https://www.sec-consult.com&lt;br /&gt;
&lt;br /&gt;
=======================================================================&lt;br /&gt;
&lt;br /&gt;
Vendor description:&lt;br /&gt;
-------------------&lt;br /&gt;
&amp;quot;Magento Commerce, offers a one-of-a-kind eCommerce solution with&lt;br /&gt;
enterprise power, unlimited scalability, and open-source flexibility&lt;br /&gt;
for B2C and B2B experiences. Magento allows you to create unique,&lt;br /&gt;
full-lifecycle customer experiences proven to generate more sales.&lt;br /&gt;
No matter what your company’s size or goals — omnichannel, global&lt;br /&gt;
expansion, mobile — Magento delivers everything you need for growth&lt;br /&gt;
in an increasingly competitive market.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: https://magento.com/products&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Business recommendation:&lt;br /&gt;
------------------------&lt;br /&gt;
Update to the latest version of Adobe Magento Commerce.&lt;br /&gt;
&lt;br /&gt;
An in-depth security analysis performed by security professionals is highly&lt;br /&gt;
advised, as the software may be affected from further security issues.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vulnerability overview/description:&lt;br /&gt;
-----------------------------------&lt;br /&gt;
1) Reflected Cross-Site Scripting (XSS) (CVE-2021-21029)&lt;br /&gt;
This vulnerability allows an unauthenticated user to inject malicious&lt;br /&gt;
client side script into the URL and send to the victim. The browser may&lt;br /&gt;
redirect the victim (e.g. admin) to the frontend page when visiting the URL,&lt;br /&gt;
the script will be executed after the victim visits the admin panel again.&lt;br /&gt;
&lt;br /&gt;
This vulnerability has two different scenarios:&lt;br /&gt;
1. Security configuration &amp;quot;Add Secret Key to URLs&amp;quot; is enabled (default).&lt;br /&gt;
 - Admin panel path is required.&lt;br /&gt;
 - Key value (secret hash) in the URL is required.&lt;br /&gt;
 - User interaction is required (navigate back to the admin panel).&lt;br /&gt;
&lt;br /&gt;
2. Security configuration &amp;quot;Add Secret Key to URLs&amp;quot; is disabled.&lt;br /&gt;
 - Admin panel path is required.&lt;br /&gt;
 - User interaction is required (navigate back to the admin panel).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Proof of concept:&lt;br /&gt;
-----------------&lt;br /&gt;
1) Reflected Cross-Site Scripting (XSS) (CVE-2021-21029)&lt;br /&gt;
The &amp;quot;file&amp;quot; parameter is vulnerable to reflected cross-site scripting&lt;br /&gt;
vulnerability. By sending the XSS payload in the Base64 encoded format&lt;br /&gt;
in the URL as follows:&lt;br /&gt;
&lt;br /&gt;
1. Security configuration &amp;quot;Add Secret Key to URLs&amp;quot; is enabled (default).&lt;br /&gt;
URL format:&lt;br /&gt;
https://{baseURL}/{adminPath}/admin/system_design_theme/downloadCss/theme_id/{themeID}/file/{base64encoded_xss_payload}/key/{secret_hash}&lt;br /&gt;
Example URL:&lt;br /&gt;
https://127.0.0.1/index.php/admin/admin/system_design_theme/downloadCss/theme_id/1/file/PHNjcmlwdD5hbGVydCgnWFNTIGJ5IFNFQyBDb25zdWx0Jyk8L3NjcmlwdD4%3D/key/0f5d20e8559bb6f45e4840ceb6231870f3a8fe122698b37c32ceabbb33595813&lt;br /&gt;
&lt;br /&gt;
2. Security configuration &amp;quot;Add Secret Key to URLs&amp;quot; is disabled.&lt;br /&gt;
URL format:&lt;br /&gt;
https://{baseURL}/{adminPath}/admin/system_design_theme/downloadCss/theme_id/{themeID}/file/{base64encoded_xss_payload}/&lt;br /&gt;
Example URL:&lt;br /&gt;
https://127.0.0.1/index.php/admin/admin/system_design_theme/downloadCss/theme_id/1/file/PHNjcmlwdD5hbGVydCgnWFNTIGJ5IFNFQyBDb25zdWx0Jyk8L3NjcmlwdD4%3D/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vulnerable / tested versions:&lt;br /&gt;
-----------------------------&lt;br /&gt;
Magento2 version 2.3.5-p1 has been tested, which was the latest version&lt;br /&gt;
available at the time of the test. Previous versions may also be affected.&lt;br /&gt;
Later versions until the patched version v2.4.2 are affected as well.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Vendor contact timeline:&lt;br /&gt;
------------------------&lt;br /&gt;
2020-07-09 | Contacting vendor through https://hackerone.com/magento.&lt;br /&gt;
2020-07-09 | The report is flagged as out-of-scope in hackerone.&lt;br /&gt;
2020-08-13 | Contacting vendor and requesting encryption key through psirt@adobe.com.&lt;br /&gt;
2020-08-13 | Vendor provides PGP encryption key.&lt;br /&gt;
2020-08-14 | Sending encrypted advisory to the vendor.&lt;br /&gt;
2020-09-09 | Asking vendor for a status update.&lt;br /&gt;
2020-09-10 | Vendor is still investigating the issue.&lt;br /&gt;
2020-09-28 | Asking vendor for a status update.&lt;br /&gt;
2020-10-02 | Vendor is still investigating the issue.&lt;br /&gt;
2020-11-24 | Asking vendor for a status update.&lt;br /&gt;
2020-11-24 | Vendor is planing to fix the issue in next release.&lt;br /&gt;
2021-02-02 | Asking vendor for a status update and the release date.&lt;br /&gt;
2021-02-02 | Vendor is planing to release a security update on February 9th.&lt;br /&gt;
2021-02-10 | Coordinated release of security advisory.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Solution:&lt;br /&gt;
---------&lt;br /&gt;
Update to the latest available version v2.4.2 of Magento2 from the vendor's download&lt;br /&gt;
page:&lt;br /&gt;
https://magento.com/tech-resources/download&lt;br /&gt;
&lt;br /&gt;
Vendor security advisory:&lt;br /&gt;
https://helpx.adobe.com/security/products/magento/apsb21-08.html&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Workaround:&lt;br /&gt;
-----------&lt;br /&gt;
None&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Advisory URL:&lt;br /&gt;
-------------&lt;br /&gt;
https://sec-consult.com/vulnerability-lab/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~&lt;br /&gt;
&lt;br /&gt;
SEC Consult Vulnerability Lab&lt;br /&gt;
&lt;br /&gt;
SEC Consult, an Atos company&lt;br /&gt;
Europe | Asia | North America&lt;br /&gt;
&lt;br /&gt;
About SEC Consult Vulnerability Lab&lt;br /&gt;
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult, an&lt;br /&gt;
Atos company. It ensures the continued knowledge gain of SEC Consult in the&lt;br /&gt;
field of network and application security to stay ahead of the attacker. The&lt;br /&gt;
SEC Consult Vulnerability Lab supports high-quality penetration testing and&lt;br /&gt;
the evaluation of new offensive and defensive technologies for our customers.&lt;br /&gt;
Hence our customers obtain the most current information about vulnerabilities&lt;br /&gt;
and valid recommendation about the risk profile of new technologies.&lt;br /&gt;
&lt;br /&gt;
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~&lt;br /&gt;
Interested to work with the experts of SEC Consult?&lt;br /&gt;
Send us your application https://sec-consult.com/career/&lt;br /&gt;
&lt;br /&gt;
Interested in improving your cyber security with the experts of SEC Consult?&lt;br /&gt;
Contact our local offices https://sec-consult.com/contact/&lt;br /&gt;
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~&lt;br /&gt;
&lt;br /&gt;
Mail: research at sec-consult dot com&lt;br /&gt;
Web: https://www.sec-consult.com&lt;br /&gt;
Blog: http://blog.sec-consult.com&lt;br /&gt;
Twitter: https://twitter.com/sec_consult&lt;br /&gt;
&lt;br /&gt;
EOF N. Jirathammanuwat / @2021&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>