CVE-2021-43176
CVSS V2 Medium 6.5
CVSS V3 High 8.8
Description
The GOautodial API prior to commit 3c3a979 made on October 13th, 2021 takes a user-supplied “action” parameter and appends a .php file extension to locate and load the correct PHP file to implement the API call. Vulnerable versions of GOautodial do not sanitize the user input that specifies the action. This permits an attacker to execute any PHP source file with a .php extension that is present on the disk and readable by the GOautodial web server process. Combined with CVE-2021-43175, it is possible for the attacker to do this without valid credentials. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Overview
- CVE ID
- CVE-2021-43176
- Assigner
- disclosure@synopsys.com
- Vulnerability Status
- Analyzed
- Published Version
- 2021-12-07T18:15:07
- Last Modified Date
- 2021-12-09T17:46:09
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:goautodial:goautodial:4:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:goautodial:goautodial_api:2:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:S/C:P/I:P/A:P
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- SINGLE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- PARTIAL
- Base Score
- 6.5
- Severity
- MEDIUM
- Exploitability Score
- 8
- Impact Score
- 6.4
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- LOW
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 8.8
- Base Severity
- HIGH
- Exploitability Score
- 2.8
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://www.synopsys.com/blogs/software-security/cyrc-advisory-goautodial-vulnerabilities | Exploit Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-43176 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43176 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 06:42:01 | Added to TrackCVE | |||
2022-12-06 03:11:17 | 2021-12-07T18:15Z | 2021-12-07T18:15:07 | CVE Published Date | updated |
2022-12-06 03:11:17 | 2021-12-09T17:46:09 | CVE Modified Date | updated | |
2022-12-06 03:11:17 | Analyzed | Vulnerability Status | updated |