CVE-2021-32096

The ConsoleAction component of U.S. National Security Agency (NSA) Emissary 5.9.0 allows a CSRF attack that results in injecting arbitrary Ruby code (for an eval call) via the CONSOLE_COMMAND_STRING parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nsa:emissary:5.9.0:*:*:*:*:*:*:*

History

19 May 2021, 17:44

Type Values Removed Values Added
CWE CWE-352
CPE cpe:2.3:a:nsa:emissary:5.9.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 8.8
References (MISC) https://blog.sonarsource.com/code-vulnerabilities-in-nsa-application-revealed - (MISC) https://blog.sonarsource.com/code-vulnerabilities-in-nsa-application-revealed - Exploit, Third Party Advisory
References (MISC) https://portswigger.net/daily-swig/nsa-workflow-application-emissary-vulnerable-to-malicious-takeover - (MISC) https://portswigger.net/daily-swig/nsa-workflow-application-emissary-vulnerable-to-malicious-takeover - Exploit, Third Party Advisory

Information

Published : 2021-05-07 04:15

Updated : 2024-02-04 21:47


NVD link : CVE-2021-32096

Mitre link : CVE-2021-32096

CVE.ORG link : CVE-2021-32096


JSON object : View

Products Affected

nsa

  • emissary
CWE
CWE-352

Cross-Site Request Forgery (CSRF)