mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
593 lines
17 KiB
JSON
593 lines
17 KiB
JSON
{
|
|
"id": "CVE-2021-33514",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2021-05-21T23:15:07.377",
|
|
"lastModified": "2022-01-04T16:53:10.093",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Certain NETGEAR devices are affected by command injection by an unauthenticated attacker via the vulnerable /sqfs/lib/libsal.so.0.0 library used by a CGI application, as demonstrated by setup.cgi?token=';$HTTP_USER_AGENT;' with an OS command in the User-Agent field. This affects GC108P before 1.0.7.3, GC108PP before 1.0.7.3, GS108Tv3 before 7.0.6.3, GS110TPPv1 before 7.0.6.3, GS110TPv3 before 7.0.6.3, GS110TUPv1 before 1.0.4.3, GS710TUPv1 before 1.0.4.3, GS716TP before 1.0.2.3, GS716TPP before 1.0.2.3, GS724TPPv1 before 2.0.4.3, GS724TPv2 before 2.0.4.3, GS728TPPv2 before 6.0.6.3, GS728TPv2 before 6.0.6.3, GS752TPPv1 before 6.0.6.3, GS752TPv2 before 6.0.6.3, MS510TXM before 1.0.2.3, and MS510TXUP before 1.0.2.3."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Determinados dispositivos NETGEAR est\u00e1n afectados por una inyecci\u00f3n de comandos por un atacante no autenticado por medio de la biblioteca vulnerable /sqfs/lib/libsal.so.0.0 usado por una aplicaci\u00f3n CGI, como es demostrado por setup.cgi?token=';$HTTP_USER_AGENT;' con un comando del sistema operativo en el campo User-Agent. Esto afecto a GC108P versiones anteriores a1.0.7.3, GC108PP versiones anteriores a 1.0.7.3, GS108Tv3 versiones anteriores a 7.0.6.3, GS110TPPv1 versiones anteriores a 7.0.6.3, GS110TPv3 versiones anteriores a 7.0.6.3, GS110TUPv1 versiones anteriores a 1.0.4.3, GS710TUPv1 versiones anteriores a 1.0.4.3, GS716TP versiones anteriores a 1.0.2.3, GS716TPP versiones anteriores a 1.0.2.3, GS724TPPv1 versiones anteriores a 2.0.4.3, GS724TPv2 versiones anteriores a 2.0.4.3, GS728TPPv2 versiones anteriores a 6.0.6.3, GS728TPv2 versiones anteriores a 6.0.6.3, GS752TPPv1 versiones anteriores a 6.0.6.3, GS752TPv2 versiones anteriores a 6.0.6.3, MS510TXM versiones anteriores a 1.0.2.3, y MS510TXUP versiones anteriores a 1.0.2.3"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
},
|
|
{
|
|
"source": "cve@mitre.org",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "ADJACENT_NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 8.8,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 5.9
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-78"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:gc108p_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "1.0.7.3",
|
|
"matchCriteriaId": "8C620986-DC5A-41CC-A98B-889A17BC0ACF"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:gc108p:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E9E3ADD8-926C-46CD-ABDF-0F7C99879808"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:gc108pp_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "1.0.7.3",
|
|
"matchCriteriaId": "8C3F71EB-072D-4B7E-9919-7E55536F6EEE"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:gc108pp:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D79979EF-D425-4199-BC73-36FB97EA9976"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:gs108t_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "7.0.6.3",
|
|
"matchCriteriaId": "8A05E3C7-6428-4450-8583-489AD5D46527"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:gs108tv3:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8EE9EB1F-D49E-499A-B39B-7F15A1E5DAEC"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:gs110tpp_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "7.0.6.3",
|
|
"matchCriteriaId": "3C940AFA-F467-4DC1-8132-606579937978"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:gs110tpp:v1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0633037A-6C03-4006-BACE-E0892476489D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:gs110tp_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "7.0.6.3",
|
|
"matchCriteriaId": "4635972F-C455-4A72-9586-D977590156CE"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:gs110tp:v3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F2DA3649-BC53-496E-A78C-FFA471872B5A"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:gs110tup_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "1.0.4.3",
|
|
"matchCriteriaId": "D0612883-028F-40CA-A0E8-E3C8450B2A80"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:gs110tup:v1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "99672C73-B9EA-4507-8803-9D87F59B9BF4"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:gs710tup_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "1.0.4.3",
|
|
"matchCriteriaId": "8133024D-0E3D-4E4E-94B3-AFD03E352592"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:gs710tup:v1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "53C87DD8-98AF-4D2E-8BD8-5F0DE771EB6B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:gs716tp_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "1.0.2.3",
|
|
"matchCriteriaId": "D3DF66B6-AF7B-4504-808E-1F714E727702"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:gs716tp:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C9D88DD2-CE3F-431C-8FC8-01CBFB5AFED1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:gs716tpp_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "1.0.2.3",
|
|
"matchCriteriaId": "52F1C3E3-4B6B-4B28-A7E0-051E14276981"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:gs716tpp:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6DB3B313-1667-401C-92CF-EBB03CF91010"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:gs724tpp_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2.0.4.3",
|
|
"matchCriteriaId": "FC19F224-54AA-40D4-A105-3C5E673E30A8"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:gs724tpp:v1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "14D5A2DB-7837-4CB4-ADCD-E0890E893E1B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:gs724tp_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "2.0.4.3",
|
|
"matchCriteriaId": "B2163D47-4512-43C4-B794-EB98AF1A032F"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:gs724tp:v2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E871CCB4-8093-44AE-B289-CF81F82A9DB8"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:gs728tpp_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "6.0.6.3",
|
|
"matchCriteriaId": "E20C106F-5C99-4CA1-BFB5-4AAAC15ACA42"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:gs728tpp:v2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FC4DE9FB-CAD5-45F9-A11C-1C20EE2FF3A1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:gs728tp_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "6.0.6.3",
|
|
"matchCriteriaId": "4BE5E6E3-AF0C-44F6-AFC7-78BCFA8B2ABB"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:gs728tp:v2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7126D4F8-2E3C-478B-9BD2-8055DFB48D8D"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:gs752tpp_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "6.0.6.3",
|
|
"matchCriteriaId": "DFE86EBE-3C4C-45A2-BDF6-5F8929A88A2A"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:gs752tpp:v1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9C23B837-890A-4888-B875-94046F846CC4"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:gs752tp_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "6.0.6.3",
|
|
"matchCriteriaId": "27B54BD6-EE51-472D-817F-16CA2DB1541C"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:gs752tp:v2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CDD4D404-9A22-408B-89CF-5107B809CB90"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:ms510txm_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "1.0.2.3",
|
|
"matchCriteriaId": "B6F0C7DF-8542-4FB2-8081-9A1F77FD7DD0"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:ms510txm:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5CF12A57-ACFA-48AA-B41C-06EB7095C800"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netgear:ms510txup_firmware:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "1.0.2.3",
|
|
"matchCriteriaId": "5AC99505-9E3B-4F33-8E97-2F98A817A23B"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:netgear:ms510txup:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D3A918F0-36BB-4EDE-98B8-00C3DC8F7BB5"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://gynvael.coldwind.pl/?lang=en&id=733",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://kb.netgear.com/000063641/Security-Advisory-for-Pre-Authentication-Command-Injection-Vulnerability-on-Some-Smart-Switches-PSV-2021-0071",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |