{ "schema_version": "1.4.0", "id": "GHSA-xrpg-qv3x-v75v", "modified": "2023-10-18T18:31:33Z", "published": "2022-01-25T00:00:44Z", "aliases": [ "CVE-2021-45224" ], "details": "An issue was discovered in COINS Construction Cloud 11.12. In several locations throughout the application, JavaScript code is passed as a URL parameter. Attackers can trivially alter this code to cause malicious behaviour. The application is therefore vulnerable to reflected XSS via malicious URLs.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45224" }, { "type": "WEB", "url": "https://appsource.microsoft.com/en-us/product/web-apps/constructionindustrysolutionslimited-5057232.coinsconstructioncloud?tab=overview" }, { "type": "WEB", "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-053.txt" }, { "type": "WEB", "url": "https://www.syss.de/pentest-blog/multiple-schwachstellen-im-coins-construction-cloud-erp-syss-2021-028/-029/-030/-031/-051/-052/-053" } ], "database_specific": { "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-01-24T20:15:00Z" } }