← Zuruck zu CVEs
CVE-2021-39172
HIGH8.8
Beschreibung
Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.
CVE Details
CVSS v3.1 Bewertung8.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht8/27/2021
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
catchethq:catchet
Schwachen (CWE)
CWE-93
Referenzen
https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/(security-advisories@github.com)
https://github.com/fiveai/Cachet/releases/tag/v2.5.1(security-advisories@github.com)
https://github.com/fiveai/Cachet/security/advisories/GHSA-9jxw-cfrh-jxq6(security-advisories@github.com)
https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/fiveai/Cachet/releases/tag/v2.5.1(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/fiveai/Cachet/security/advisories/GHSA-9jxw-cfrh-jxq6(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.