CVE-2021-29485
CVSS V2 Medium 6.5
CVSS V3 High 8.8
Description
Ratpack is a toolkit for creating web applications. In versions prior to 1.9.0, a malicious attacker can achieve Remote Code Execution (RCE) via a maliciously crafted Java deserialization gadget chain leveraged against the Ratpack session store. If one's application does not use Ratpack's session mechanism, it is not vulnerable. Ratpack 1.9.0 introduces a strict allow-list mechanism that mitigates this vulnerability when used. Two possible workarounds exist. The simplest mitigation for users of earlier versions is to reduce the likelihood of attackers being able to write to the session data store. Alternatively or additionally, the allow-list mechanism could be manually back ported by providing an alternative implementation of `SessionSerializer` that uses an allow-list.
Overview
- CVE ID
- CVE-2021-29485
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2021-06-29T19:15:09
- Last Modified Date
- 2021-07-08T15:26:03
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:ratpack_project:ratpack:*:*:*:*:*:*:*:* | 1 | OR | 1.9.0 |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:S/C:P/I:P/A:P
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- SINGLE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- PARTIAL
- Base Score
- 6.5
- Severity
- MEDIUM
- Exploitability Score
- 8
- Impact Score
- 6.4
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- LOW
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 8.8
- Base Severity
- HIGH
- Exploitability Score
- 2.8
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://mvnrepository.com/artifact/io.ratpack/ratpack-core | Release Notes Third Party Advisory |
https://github.com/ratpack/ratpack/security/advisories/GHSA-hc33-32vw-rpp9 | Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-29485 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29485 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 07:08:29 | Added to TrackCVE | |||
2022-12-05 05:12:23 | 2021-06-29T19:15Z | 2021-06-29T19:15:09 | CVE Published Date | updated |
2022-12-05 05:12:23 | 2021-07-08T15:26:03 | CVE Modified Date | updated | |
2022-12-05 05:12:23 | Analyzed | Vulnerability Status | updated |