A code injection vulnerability in the Ivanti EPM Cloud Services Appliance (CSA) allows an unauthenticated user to execute arbitrary code with limited permissions (nobody).
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/166383/Ivanti-Endpoint-Manager-CSA-4.5-4.6-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/170590/Ivanti-Cloud-Services-Appliance-CSA-Command-Injection.html | Exploit Third Party Advisory VDB Entry |
https://forums.ivanti.com/s/article/SA-2021-12-02 | Mitigation Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
18 Apr 2022, 19:28
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://packetstormsecurity.com/files/166383/Ivanti-Endpoint-Manager-CSA-4.5-4.6-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry |
22 Mar 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Dec 2021, 18:36
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:ivanti:endpoint_manager_cloud_services_appliance:*:*:*:*:*:*:*:* cpe:2.3:a:ivanti:endpoint_manager_cloud_services_appliance:4.6:-:*:*:*:*:*:* |
|
References | (MISC) https://forums.ivanti.com/s/article/SA-2021-12-02 - Mitigation, Patch, Vendor Advisory | |
CWE | CWE-94 | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
08 Dec 2021, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-12-08 22:15
Updated : 2024-08-14 15:11
NVD link : CVE-2021-44529
Mitre link : CVE-2021-44529
CVE.ORG link : CVE-2021-44529
JSON object : View
Products Affected
ivanti
- endpoint_manager_cloud_services_appliance
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')