CVE-2021-39172

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-39172
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-39172.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2021-39172
Aliases
Published
2021-08-27T23:15:06Z
Modified
2024-05-15T01:14:51.534214Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving UpdateConfigCommandHandler and preventing the use of new lines characters in new configuration values. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.

References

Affected packages

Git / github.com/fiveai/cachet

Affected ranges

Type
GIT
Repo
https://github.com/fiveai/cachet
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0.0
v1.1.0
v1.1.1
v1.2.0
v1.2.1

v2.*

v2.0.0
v2.0.0-RC1
v2.0.0-RC2
v2.0.0-RC3
v2.0.0-RC4
v2.0.0-RC5
v2.0.0-beta1
v2.0.0-beta2
v2.0.1
v2.0.2
v2.0.3
v2.0.4
v2.1.0
v2.1.0-RC1
v2.1.0-RC2
v2.1.1
v2.1.2
v2.2.0
v2.2.0-RC1
v2.2.1
v2.2.2
v2.2.3
v2.2.4
v2.3.0
v2.3.0-RC1
v2.3.0-RC2
v2.3.0-RC3
v2.3.0-RC4
v2.3.0-RC5
v2.3.0-RC6
v2.3.1
v2.3.10
v2.3.2
v2.3.3
v2.3.4
v2.3.5
v2.3.6
v2.3.7
v2.3.8
v2.3.9
v2.5.0