cvelist/2021/27xxx/CVE-2021-27798.json

70 lines
2.4 KiB
JSON
Raw Normal View History

2021-02-26 21:00:41 +00:00
{
2025-02-15 01:00:32 +00:00
"data_version": "4.0",
2021-02-26 21:00:41 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2021-27798",
2022-08-05 16:00:53 +00:00
"ASSIGNER": "sirt@brocade.com",
"STATE": "PUBLIC"
},
2025-02-15 01:00:32 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "** UNSUPPPORTED WHEN ASSIGNED ** A vulnerability in Brocade Fabric OS versions 7.4.1b and 7.3.1d could allow local users to conduct privileged directory transversal. Brocade Fabric OS versions 7.4.1.x and 7.3.x have reached end of life. Brocade Fabric OS Users should upgrade to supported versions as described in the Product End-of-Life published report."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
"cweId": "CWE-22"
}
]
}
]
},
2022-08-05 16:00:53 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
2025-02-15 01:00:32 +00:00
"vendor_name": "Brocade",
2022-08-05 16:00:53 +00:00
"product": {
"product_data": [
{
"product_name": "Brocade Fabric OS",
"version": {
"version_data": [
{
2025-02-15 01:00:32 +00:00
"version_affected": "=",
"version_value": "Brocade Fabric OS 7.4.1b, and 7.3.1d."
2022-08-05 16:00:53 +00:00
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
2025-02-15 01:00:32 +00:00
"url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2012",
2022-08-05 16:00:53 +00:00
"refsource": "MISC",
2025-02-15 01:00:32 +00:00
"name": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2012"
2022-08-05 16:00:53 +00:00
}
]
2021-02-26 21:00:41 +00:00
},
2025-02-15 01:00:32 +00:00
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
2021-02-26 21:00:41 +00:00
}
}