← Retour aux CVEs
CVE-2021-39172
HIGH8.8
Description
Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.
Details CVE
Score CVSS v3.18.8
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie8/27/2021
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
catchethq:catchet
Faiblesses (CWE)
CWE-93
References
https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/(security-advisories@github.com)
https://github.com/fiveai/Cachet/releases/tag/v2.5.1(security-advisories@github.com)
https://github.com/fiveai/Cachet/security/advisories/GHSA-9jxw-cfrh-jxq6(security-advisories@github.com)
https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/fiveai/Cachet/releases/tag/v2.5.1(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/fiveai/Cachet/security/advisories/GHSA-9jxw-cfrh-jxq6(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.