2021-02-01 05:00:41 +00:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
2022-02-04 11:34:55 +01:00
"DATE_PUBLIC" : "2021-07-07T10:49:00.000Z" ,
2021-06-08 19:00:55 +00:00
"ID" : "CVE-2021-26473" ,
2022-02-04 11:34:55 +01:00
"STATE" : "PUBLIC" ,
"TITLE" : "Unauthenticated arbitrary file upload and command execution in Vembu products"
2021-06-08 19:00:55 +00:00
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
2022-02-04 23:01:43 +00:00
"product_name" : "n/a" ,
2021-06-08 19:00:55 +00:00
"version" : {
"version_data" : [
{
2022-02-04 23:01:43 +00:00
"version_value" : "n/a"
2021-06-08 19:00:55 +00:00
}
]
}
}
]
} ,
2022-02-04 23:01:43 +00:00
"vendor_name" : "n/a"
2021-06-08 19:00:55 +00:00
}
]
}
2021-02-01 05:00:41 +00:00
} ,
2022-02-04 11:34:55 +01:00
"credit" : [
{
"lang" : "eng" ,
"value" : "Discovered by Wietse Boonstra"
} ,
{
"lang" : "eng" ,
"value" : "Addional research by Frank Breedijk"
}
] ,
2021-06-08 19:00:55 +00:00
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
2021-02-01 05:00:41 +00:00
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2022-02-04 11:34:55 +01:00
"value" : "In VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1 the http API located at /sgwebservice_o.php action logFilePath allows an attacker to write arbitrary files in the context of the web server process. These files can then be executed remotely by calling the file via the web server."
2021-06-08 19:00:55 +00:00
}
]
} ,
2022-02-04 11:34:55 +01:00
"generator" : {
"engine" : "Vulnogram 0.0.9"
} ,
"impact" : {
"cvss" : {
"attackComplexity" : "LOW" ,
"attackVector" : "NETWORK" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.8 ,
"baseSeverity" : "CRITICAL" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"scope" : "UNCHANGED" ,
"userInteraction" : "NONE" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"version" : "3.1"
}
} ,
2021-06-08 19:00:55 +00:00
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
2022-02-04 23:01:43 +00:00
"value" : "n/a"
2021-06-08 19:00:55 +00:00
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
2022-02-04 11:34:55 +01:00
"name" : "https://csirt.divd.nl/cases/DIVD-2020-00011/" ,
"refsource" : "CONFIRM" ,
"url" : "https://csirt.divd.nl/cases/DIVD-2020-00011/"
2021-06-08 19:00:55 +00:00
} ,
{
"name" : "https://csirt.divd.nl/2021/05/11/Vembu-zero-days/" ,
2022-02-04 11:34:55 +01:00
"refsource" : "CONFIRM" ,
2021-06-08 19:00:55 +00:00
"url" : "https://csirt.divd.nl/2021/05/11/Vembu-zero-days/"
} ,
{
2022-02-04 11:34:55 +01:00
"name" : "https://www.wbsec.nl/vembu" ,
"refsource" : "CONFIRM" ,
"url" : "https://www.wbsec.nl/vembu"
2022-02-04 23:01:43 +00:00
} ,
{
"name" : "https://csirt.divd.nl/cves/CVE-2021-26473/" ,
"refsource" : "CONFIRM" ,
"url" : "https://csirt.divd.nl/cves/CVE-2021-26473/"
2021-02-01 05:00:41 +00:00
}
]
2022-02-04 11:34:55 +01:00
} ,
"source" : {
"advisory" : "DIVD-2020-00011" ,
"discovery" : "EXTERNAL"
2021-02-01 05:00:41 +00:00
}
}