CVE-2021-43176

CVSS V2 Medium 6.5 CVSS V3 High 8.8
Description
The GOautodial API prior to commit 3c3a979 made on October 13th, 2021 takes a user-supplied “action” parameter and appends a .php file extension to locate and load the correct PHP file to implement the API call. Vulnerable versions of GOautodial do not sanitize the user input that specifies the action. This permits an attacker to execute any PHP source file with a .php extension that is present on the disk and readable by the GOautodial web server process. Combined with CVE-2021-43175, it is possible for the attacker to do this without valid credentials. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
Overview
  • CVE ID
  • CVE-2021-43176
  • Assigner
  • disclosure@synopsys.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2021-12-07T18:15:07
  • Last Modified Date
  • 2021-12-09T17:46:09
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:goautodial:goautodial:4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:goautodial:goautodial_api:2:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:S/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • SINGLE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 6.5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • LOW
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 8.8
  • Base Severity
  • HIGH
  • Exploitability Score
  • 2.8
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
https://www.synopsys.com/blogs/software-security/cyrc-advisory-goautodial-vulnerabilities Exploit Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 06:42:01 Added to TrackCVE
2022-12-06 03:11:17 2021-12-07T18:15Z 2021-12-07T18:15:07 CVE Published Date updated
2022-12-06 03:11:17 2021-12-09T17:46:09 CVE Modified Date updated
2022-12-06 03:11:17 Analyzed Vulnerability Status updated