CVE-2021-26473
Published Jun 8, 2021
Last updated 3 years ago
Overview
- Description
- In VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1 the http API located at /sgwebservice_o.php action logFilePath allows an attacker to write arbitrary files in the context of the web server process. These files can then be executed remotely by calling the file via the web server.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-434
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vembu:bdr_suite:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9F91BA2-195F-4A24-9403-724BD268CB56", "versionEndExcluding": "4.2.0.1" }, { "criteria": "cpe:2.3:a:vembu:offsite_dr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04101E71-5807-4324-9992-358362D276E4", "versionEndExcluding": "4.2.0.1" } ], "operator": "OR" } ] } ]