← Volver a CVEs
CVE-2021-21311
HIGHCISA KEV7.2
Descripcion
Adminer is an open-source database management in a single PHP file. In adminer from version 4.0.0 and before 4.7.9 there is a server-side request forgery vulnerability. Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected. This is fixed in version 4.7.9.
Detalles CVE
Puntuacion CVSS v3.17.2
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado2/11/2021
Ultima modificacion10/24/2025
Fuentekev
Avistamientos honeypot0
CISA KEV
VendedorAdminer
ProductoAdminer
Nombre vulnerabilidadAdminer Server-Side Request Forgery Vulnerability
Fecha inclusion KEV2025-09-29
Fecha limite remediacion2025-10-20
Uso en ransomwareUnknown
Productos afectados
adminer:adminerdebian:debian_linux
Debilidades (CWE)
CWE-918
Referencias
https://github.com/vrana/adminer/commit/ccd2374b0b12bd547417bf0dacdf153826c83351(security-advisories@github.com)
https://github.com/vrana/adminer/files/5957311/Adminer.SSRF.pdf(security-advisories@github.com)
https://github.com/vrana/adminer/security/advisories/GHSA-x5r2-hj5c-8jx6(security-advisories@github.com)
https://lists.debian.org/debian-lts-announce/2021/03/msg00002.html(security-advisories@github.com)
https://packagist.org/packages/vrana/adminer(security-advisories@github.com)
https://github.com/vrana/adminer/commit/ccd2374b0b12bd547417bf0dacdf153826c83351(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/vrana/adminer/files/5957311/Adminer.SSRF.pdf(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/vrana/adminer/security/advisories/GHSA-x5r2-hj5c-8jx6(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2021/03/msg00002.html(af854a3a-2127-422b-91ae-364da2661108)
https://packagist.org/packages/vrana/adminer(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-21311(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.