UBUNTU-CVE-2021-32644

Source
https://ubuntu.com/security/CVE-2021-32644
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-32644.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2021-32644
Related
Published
2021-06-22T18:15:00Z
Modified
2025-06-02T17:12:50Z
Severity
  • 6.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N CVSS Calculator
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Ampache is an open source web based audio/video streaming application and file manager. Due to a lack of input filtering versions 4.x.y are vulnerable to code injection in random.php. The attack requires user authentication to access the random.php page unless the site is running in demo mode. This issue has been resolved in 4.4.3.

References

Affected packages

Ubuntu:Pro:16.04:LTS / ampache

Package

Name
ampache
Purl
pkg:deb/ubuntu/ampache@3.6-rzb2779+dfsg-0ubuntu9.2?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.6-rzb2779+dfsg-0ubuntu5
3.6-rzb2779+dfsg-0ubuntu6
3.6-rzb2779+dfsg-0ubuntu7
3.6-rzb2779+dfsg-0ubuntu8
3.6-rzb2779+dfsg-0ubuntu9
3.6-rzb2779+dfsg-0ubuntu9.1
3.6-rzb2779+dfsg-0ubuntu9.2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}