← Back to CVEs
CVE-2021-28113
MEDIUM6.7
Description
A command injection vulnerability in the cookieDomain and relayDomain parameters of Okta Access Gateway before 2020.9.3 allows attackers (with admin access to the Okta Access Gateway UI) to execute OS commands as a privileged system account.
CVE Details
CVSS v3.1 Score6.7
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published4/2/2021
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
okta:access_gateway
Weaknesses (CWE)
CWE-78
References
http://packetstormsecurity.com/files/163428/Okta-Access-Gateway-2020.5.5-Authenticated-Remote-Root.html(cve@mitre.org)
https://www.okta.com/security-advisories/cve-2021-28113(cve@mitre.org)
http://packetstormsecurity.com/files/163428/Okta-Access-Gateway-2020.5.5-Authenticated-Remote-Root.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.okta.com/security-advisories/cve-2021-28113(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.