Skip to main content

CVE-2021-25926: Cross-Site Scripting in sickrage

Medium
VulnerabilityCVE-2021-25926cvecve-2021-25926
Published: Mon Apr 12 2021 (04/12/2021, 13:45:57 UTC)
Source: CVE
Vendor/Project: n/a
Product: sickrage

Description

In SiCKRAGE, versions 9.3.54.dev1 to 10.0.11.dev1 are vulnerable to Reflected Cross-Site-Scripting (XSS) due to user input not being validated properly in the `quicksearch` feature. Therefore, an attacker can steal a user's sessionID to masquerade as a victim user, to carry out any actions in the context of the user.

AI-Powered Analysis

AILast updated: 06/25/2025, 10:47:40 UTC

Technical Analysis

CVE-2021-25926 is a Reflected Cross-Site Scripting (XSS) vulnerability affecting SiCKRAGE versions 9.3.54.dev1 through 10.0.11.dev1. The vulnerability arises from improper validation of user input in the 'quicksearch' feature, which allows an attacker to inject malicious scripts that are reflected back to the user without proper sanitization. When a victim user interacts with a crafted URL or input, the malicious script executes in their browser context, enabling the attacker to steal the user's sessionID. With the stolen sessionID, the attacker can impersonate the victim and perform any actions available to that user within the SiCKRAGE application. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), indicating a failure to properly sanitize inputs before rendering them in web pages. The CVSS v3.1 base score is 6.1 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and low impact on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). No known exploits have been reported in the wild, and no official patches or vendor project information are provided in the data. The vulnerability allows attackers to hijack user sessions, potentially leading to unauthorized access and actions within the affected SiCKRAGE instances.

Potential Impact

For European organizations using SiCKRAGE, this vulnerability poses a risk primarily to the confidentiality and integrity of user sessions. Attackers exploiting this XSS flaw can hijack user sessions, leading to unauthorized access to user accounts and potentially sensitive data managed through SiCKRAGE. While SiCKRAGE is typically used for personal media management, organizations or individuals using it in shared or networked environments could face risks of account compromise. The scope of impact depends on the deployment context; if SiCKRAGE is integrated into larger systems or accessed by multiple users, the risk increases. The vulnerability requires user interaction, meaning phishing or social engineering could be used to lure victims into clicking malicious links. Although availability is not directly affected, the compromise of user sessions could lead to unauthorized changes or data exposure. European organizations with users running vulnerable versions may face privacy violations or unauthorized access incidents, which could have compliance implications under GDPR if personal data is involved.

Mitigation Recommendations

1. Upgrade SiCKRAGE to a version beyond 10.0.11.dev1 where this vulnerability is fixed or apply any available patches from trusted sources. 2. If upgrading is not immediately possible, implement web application firewall (WAF) rules to detect and block malicious input patterns targeting the 'quicksearch' feature. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing SiCKRAGE. 4. Educate users about the risks of clicking on untrusted links, especially those that could trigger the quicksearch functionality. 5. Monitor logs for unusual access patterns or repeated attempts to exploit the quicksearch feature. 6. Consider isolating SiCKRAGE instances from critical networks or sensitive data environments to limit potential damage. 7. Implement session management best practices, such as short session lifetimes and multi-factor authentication, to reduce the impact of session hijacking.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Mend
Date Reserved
2021-01-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbedac8

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 6/25/2025, 10:47:40 AM

Last updated: 8/4/2025, 12:52:51 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats