{"vulnerability": "cve-2021-3271", "sightings": [{"uuid": "b834ad9c-0e91-415d-8a47-0477e050ab15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3271", "type": "published-proof-of-concept", "source": "Telegram/CoynOiD_judprWTJ7km9bo93P1_loN4LLnz69hTt4FqhZA", "content": "", "creation_timestamp": "2021-10-01T21:51:15.000000Z"}, {"uuid": "43028641-ecd1-4eb6-947b-565ed9a4107c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3271", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2732", "content": "#Red_Team_Tactics\n1. Generating Custom Cobalt Strike Artifacts with PEzor\nhttps://iwantmore.pizza/posts/PEzor3.html\n2. CVE-2021-3271:\nPressbooks Stored Cross Site Scripting PoC\nhttps://www.gosecure.net/blog/2021/02/16/cve-2021-3271-pressbooks-stored-cross-site-scripting-proof-of-concept", "creation_timestamp": "2021-02-18T11:00:20.000000Z"}, {"uuid": "961daa49-ddbf-4dc4-b900-691f800f4963", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3271", "type": "seen", "source": "https://t.me/arpsyndicate/2743", "content": "#ExploitObserverAlert\n\nCVE-2021-3271\n\nDESCRIPTION: Exploit Observer has 4 entries related to CVE-2021-3271. PressBooks 5.17.3 contains a cross-site scripting (XSS). Stored XSS can be submitted via the Book Info's Long Description Body, and all actions to open or preview the books page will result in the triggering the stored XSS.\n\nFIRST-EPSS: 0.000630000\nNVD-IS: 2.7\nNVD-ES: 1.7", "creation_timestamp": "2024-01-09T10:33:11.000000Z"}, {"uuid": "02910c6e-2bf6-4051-aea8-cb6d593fa164", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32714", "type": "seen", "source": "https://t.me/cibsecurity/25990", "content": "\u203c CVE-2021-32714 \u203c\n\nhyper is an HTTP library for Rust. In versions prior to 0.14.10, hyper's HTTP server and client code had a flaw that could trigger an integer overflow when decoding chunk sizes that are too big. This allows possible data loss, or if combined with an upstream HTTP proxy that allows chunk sizes larger than hyper does, can result in \"request smuggling\" or \"desync attacks.\" The vulnerability is patched in version 0.14.10. Two possible workarounds exist. One may reject requests manually that contain a `Transfer-Encoding` header or ensure any upstream proxy rejects `Transfer-Encoding` chunk sizes greater than what fits in 64-bit unsigned integers.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-08T00:38:05.000000Z"}, {"uuid": "dd843ec0-c9c8-4080-95a0-a61f2d689d93", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32719", "type": "seen", "source": "https://t.me/cibsecurity/25746", "content": "\u203c CVE-2021-32719 \u203c\n\nRabbitMQ is a multi-protocol messaging broker. In rabbitmq-server prior to version 3.8.18, when a federation link was displayed in the RabbitMQ management UI via the `rabbitmq_federation_management` plugin, its consumer tag was rendered without proper  tag sanitization. This potentially allows for JavaScript code execution in the context of the page. The user must be signed in and have elevated permissions (manage federation upstreams and policies) for this to occur. The vulnerability is patched in RabbitMQ 3.8.18. As a workaround, disable the `rabbitmq_federation_management` plugin and use [CLI tools](https://www.rabbitmq.com/cli.html) instead.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-06-28T20:27:49.000000Z"}, {"uuid": "10d74b16-454f-4fb8-9095-c868d4699abf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32711", "type": "published-proof-of-concept", "source": "https://t.me/cibsecurity/25697", "content": "\u203c CVE-2021-32711 \u203c\n\nShopware is an open source eCommerce platform. Versions prior to 6.3.5.1 may leak of information via Store-API. The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. We recommend to update to the current version 6.3.5.1. You can get the update to 6.3.5.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. Please check your plugins if you have it in use. Detailed technical information can be found in the upgrade information. https://github.com/shopware/platform/blob/v6.3.5.1/UPGRADE-6.3.md#6351 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-06-25T00:18:50.000000Z"}, {"uuid": "4ea8bf8e-3d12-4b7d-bbf1-1b1ee66381ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-32716", "type": "seen", "source": "https://t.me/cibsecurity/25696", "content": "\u203c CVE-2021-32716 \u203c\n\nShopware is an open source eCommerce platform. In versions prior to 6.4.1.1 the admin api has exposed some internal hidden fields when an association has been loaded with a to many reference. Users are recommend to update to version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-06-25T00:18:49.000000Z"}, {"uuid": "b752bb41-5ec0-4e68-b684-6d227c7e31f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-32714", "type": "seen", "source": "https://gist.github.com/soul2zimate/a5296bc917881b1c43c396b5caf75393", "content": "", "creation_timestamp": "2026-04-07T11:43:13.000000Z"}, {"uuid": "2d1e000e-a680-4fe6-942f-4a7d80814c39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2021-32715", "type": "seen", "source": "https://gist.github.com/soul2zimate/a5296bc917881b1c43c396b5caf75393", "content": "", "creation_timestamp": "2026-04-07T11:43:13.000000Z"}, {"uuid": "d68d1eb9-124c-4847-a1a7-ae1908e538e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-3271", "type": "seen", "source": "https://t.me/cibsecurity/23834", "content": "\u203c CVE-2021-3271 \u203c\n\nPressBooks 5.17.3 contains a cross-site scripting (XSS). Stored XSS can be submitted via the Book Info's Long Description Body, and all actions to open or preview the books page will result in the triggering the stored XSS.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-18T22:50:27.000000Z"}]}