{"vulnerability": "CVE-2021-35489", "sightings": [{"uuid": "984ebd6a-a6ed-44c1-b3df-76020a348180", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-35489", "type": "seen", "source": "https://t.me/cibsecurity/32130", "content": "\u203c CVE-2021-35489 \u203c\n\nThruk 2.40-2 allows /thruk/#cgi-bin/extinfo.cgi?type=2&amp;host={HOSTNAME]&amp;service={SERVICENAME]&amp;backend={BACKEND] Reflected XSS via the host or service parameter. An attacker could inject arbitrary JavaScript into extinfo.cgi. The malicious payload would be triggered every time an authenticated user browses the page containing it.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-10T02:35:30.000000Z"}]}