In OpenCRX, versions v4.0.0 through v5.1.0 are vulnerable to reflected Cross-site Scripting (XSS), due to unsanitized parameters in the password reset functionality. This allows execution of external javascript files on any user of the openCRX instance.
[
{
"id": "CVE-2021-25959-3d12a421",
"source": "https://github.com/opencrx/opencrx/commit/14e75f95e5f56fbe7ee897bdf5d858788072e818",
"target": {
"function": "copyDb",
"file": "core/src/main/java/org/opencrx/kernel/tools/CopyDb.java"
},
"signature_version": "v1",
"deprecated": false,
"digest": {
"function_hash": "299926449566693712240401486120705060548",
"length": 1272.0
},
"signature_type": "Function"
},
{
"id": "CVE-2021-25959-79065f0e",
"source": "https://github.com/opencrx/opencrx/commit/14e75f95e5f56fbe7ee897bdf5d858788072e818",
"target": {
"function": "copyDbObject",
"file": "core/src/main/java/org/opencrx/kernel/tools/CopyDb.java"
},
"signature_version": "v1",
"deprecated": false,
"digest": {
"function_hash": "153014618847153202251050346306638867562",
"length": 3727.0
},
"signature_type": "Function"
},
{
"id": "CVE-2021-25959-a522a2d6",
"source": "https://github.com/opencrx/opencrx/commit/14e75f95e5f56fbe7ee897bdf5d858788072e818",
"target": {
"file": "core/src/main/java/org/opencrx/kernel/tools/CopyDb.java"
},
"signature_version": "v1",
"deprecated": false,
"digest": {
"line_hashes": [
"252974067760682639526069339914185005060",
"67307008562535689517234536862088945489",
"219511582486534768945373860123843421775",
"157950679091514196060976590044903556173",
"283744227869885296625868921359126648981",
"173950007691500410815011086662779563699",
"183425582796188218942433615138051562480",
"268199670166582995169337558919550266166"
],
"threshold": 0.9
},
"signature_type": "Line"
}
]