CVE-2021-33191

From Apache NiFi MiNiFi C++ version 0.5.0 the c2 protocol implements an "agent-update" command which was designed to patch the application binary. This "patching" command defaults to calling a trusted binary, but might be modified to an arbitrary value through a "c2-update" command. Said command is then executed using the same privileges as the application binary. This was addressed in version 0.10.0
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:nifi_minifi_c\+\+:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:08

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2021/08/24/1 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2021/08/24/1 - Mailing List, Third Party Advisory
References () https://lists.apache.org/thread.html/r6f27a2454f5f67dbe4e21c8eb1db537b01863a0bc3758f28aa60f032%40%3Cannounce.apache.org%3E - () https://lists.apache.org/thread.html/r6f27a2454f5f67dbe4e21c8eb1db537b01863a0bc3758f28aa60f032%40%3Cannounce.apache.org%3E -
References () https://www.openwall.com/lists/oss-security/2021/08/24/1 - Mailing List, Third Party Advisory () https://www.openwall.com/lists/oss-security/2021/08/24/1 - Mailing List, Third Party Advisory

31 Aug 2021, 11:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
CWE CWE-78
CPE cpe:2.3:a:apache:nifi_minifi_c\+\+:*:*:*:*:*:*:*:*
References (MISC) https://www.openwall.com/lists/oss-security/2021/08/24/1 - (MISC) https://www.openwall.com/lists/oss-security/2021/08/24/1 - Mailing List, Third Party Advisory
References (MLIST) https://lists.apache.org/thread.html/r6f27a2454f5f67dbe4e21c8eb1db537b01863a0bc3758f28aa60f032@%3Cannounce.apache.org%3E - (MLIST) https://lists.apache.org/thread.html/r6f27a2454f5f67dbe4e21c8eb1db537b01863a0bc3758f28aa60f032@%3Cannounce.apache.org%3E - Mailing List, Vendor Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/08/24/1 - (MLIST) http://www.openwall.com/lists/oss-security/2021/08/24/1 - Mailing List, Third Party Advisory

24 Aug 2021, 19:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.apache.org/thread.html/r6f27a2454f5f67dbe4e21c8eb1db537b01863a0bc3758f28aa60f032@%3Cannounce.apache.org%3E -

24 Aug 2021, 15:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/08/24/1 -

24 Aug 2021, 13:00

Type Values Removed Values Added
New CVE

Information

Published : 2021-08-24 12:15

Updated : 2024-11-21 06:08


NVD link : CVE-2021-33191

Mitre link : CVE-2021-33191

CVE.ORG link : CVE-2021-33191


JSON object : View

Products Affected

apache

  • nifi_minifi_c\+\+
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')