An issue was discovered in CALDERA 2.9.0. The Debrief plugin receives base64 encoded "SVG" parameters when generating a PDF document. These SVG documents are parsed in an unsafe manner and can be leveraged for XXE attacks (e.g., File Exfiltration, Server Side Request Forgery, Out of Band Exfiltration, etc.).
References
Link | Resource |
---|---|
https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42560-Unsafe%20XML%20Parsing-MITRE%20Caldera | Exploit Third Party Advisory |
https://github.com/mitre/caldera/releases | Release Notes Third Party Advisory |
Configurations
History
15 Jan 2022, 02:52
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/mitre/caldera/releases - Release Notes, Third Party Advisory | |
References | (MISC) https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-42560-Unsafe%20XML%20Parsing-MITRE%20Caldera - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 8.8 |
CPE | cpe:2.3:a:mitre:caldera:2.9.0:*:*:*:*:*:*:* | |
CWE | CWE-611 |
12 Jan 2022, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-01-12 19:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-42560
Mitre link : CVE-2021-42560
CVE.ORG link : CVE-2021-42560
JSON object : View
Products Affected
mitre
- caldera
CWE
CWE-611
Improper Restriction of XML External Entity Reference