cve/2021/CVE-2021-36202.md
2025-09-29 21:09:30 +02:00

19 lines
967 B
Markdown

### [CVE-2021-36202](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36202)
![](https://img.shields.io/static/v1?label=Product&message=Metasys&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=All%2010%20versions%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=All%2011%20versions%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)&color=brightgreen)
### Description
Server-Side Request Forgery (SSRF) vulnerability in Johnson Controls Metasys could allow an authenticated attacker to inject malicious code into the MUI PDF export feature. This issue affects: Johnson Controls Metasys All 10 versions versions prior to 10.1.5; All 11 versions versions prior to 11.0.2.
### POC
#### Reference
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
#### Github
No PoCs found on GitHub currently.