Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2021-22872
CVE information
Published
Last Modified
CVSSv2.0 Severity
CVSSv3.1 Severity
Impact Analysis
Description
Revive Adserver before 5.1.0 is vulnerable to a reflected cross-site scripting (XSS) vulnerability via the publicly accessible afr.php delivery script. While this issue was previously addressed in modern browsers as CVE-2020-8115, some older browsers (e.g., IE10) that do not automatically URL encode parameters were still vulnerable..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 4.3/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- None
- Integrity Impact
- Partial
CVSSv3.1 Score
- Severity
- Medium
- Base Score
- 6.1/10
- Exploit Score
- 2.8/10
- Access Vector
- Network
- Access Complexity
- Low
- Privileges Required
- None
- Impact Score
- 2.7/10
- Confidentiality Impact
- Low
- Availability Impact
- None
- Integrity Impact
- Low
- Scope
- Changed
- User Interaction
- Required
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:revive-adserver:revive_adserver:*:*:*:*:*:*:*:* |
Yes
|
- | 5.1.0 |
References
- https://github.com/revive-adserver/revive-adserver/commit/1dbcf7d50
- http://seclists.org/fulldisclosure/2021/Jan/60
- https://github.com/revive-adserver/revive-adserver/commit/00fdb8d0e
- https://hackerone.com/reports/986365
- http://packetstormsecurity.com/files/161070/Revive-Adserver-5.0.5-Cross-Site-Scripting-O
- https://www.revive-adserver.com/security/revive-sa-2021-001/