← Retour aux CVEs
CVE-2021-28113
MEDIUM6.7
Description
A command injection vulnerability in the cookieDomain and relayDomain parameters of Okta Access Gateway before 2020.9.3 allows attackers (with admin access to the Okta Access Gateway UI) to execute OS commands as a privileged system account.
Details CVE
Score CVSS v3.16.7
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisHIGH
Interaction utilisateurNONE
Publie4/2/2021
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
okta:access_gateway
Faiblesses (CWE)
CWE-78
References
http://packetstormsecurity.com/files/163428/Okta-Access-Gateway-2020.5.5-Authenticated-Remote-Root.html(cve@mitre.org)
https://www.okta.com/security-advisories/cve-2021-28113(cve@mitre.org)
http://packetstormsecurity.com/files/163428/Okta-Access-Gateway-2020.5.5-Authenticated-Remote-Root.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.okta.com/security-advisories/cve-2021-28113(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.