Miggo Logo

CVE-2021-44791: Apache Druid before 0.23.0 vulnerable to reflected XSS via unescaped URL parameters

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.87142%
Published
7/8/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.druid:druidmaven< 0.23.00.23.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The provided vulnerability information describes a reflected XSS issue caused by unescaped URL parameters in HTML responses. However, the GitHub patch information and commit diffs are explicitly marked as unavailable, and the public descriptions do not contain specific code references or file paths. While the vulnerability pattern suggests improper output encoding in web request handlers, there is insufficient technical detail to identify exact function names, file paths, or implementation contexts with high confidence. The vulnerability could theoretically exist in multiple parameter handling locations, but without concrete code examples or patch comparisons, specific vulnerable functions cannot be reliably determined.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In *p**** *rui* *.**.* *n* **rli*r, **rt*in sp**i*lly-*r**t** links r*sult in un*s**p** URL p*r*m*t*rs **in* s*nt ***k in *TML r*spons*s. T*is m*k*s it possi*l* to *x**ut* r**l**t** XSS *tt**ks. T*is issu* is p*t**** in v*rsion *.**.*.

Reasoning

T** provi*** vuln*r**ility in*orm*tion **s*ri**s * r**l**t** XSS issu* **us** *y un*s**p** URL p*r*m*t*rs in *TML r*spons*s. *ow*v*r, t** *it*u* p*t** in*orm*tion *n* *ommit *i**s *r* *xpli*itly m*rk** *s un*v*il**l*, *n* t** pu*li* **s*riptions *o n