Vulnerabilites related to fiveai - Cachet
CVE-2021-39165 (GCVE-0-2021-39165)
Vulnerability from cvelistv5
Published
2021-08-26 20:25
Modified
2024-08-04 01:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Cachet is an open source status page. With Cachet prior to and including 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator's password and session. The original repository of Cachet <https://github.com/CachetHQ/Cachet> is not active, the stable version 2.3.18 and it's developing 2.4 branch is affected.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:58:18.142Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/fiveai/Cachet/security/advisories/GHSA-79mg-4w23-4fqc" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/fiveai/Cachet/commit/27bca8280419966ba80c6fa283d985ddffa84bb6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cachet", "vendor": "fiveai", "versions": [ { "status": "affected", "version": "\u003c= 2.3.18" } ] } ], "descriptions": [ { "lang": "en", "value": "Cachet is an open source status page. With Cachet prior to and including 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator\u0027s password and session. The original repository of Cachet \u003chttps://github.com/CachetHQ/Cachet\u003e is not active, the stable version 2.3.18 and it\u0027s developing 2.4 branch is affected." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287: Improper Authentication", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-26T20:25:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/fiveai/Cachet/security/advisories/GHSA-79mg-4w23-4fqc" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/fiveai/Cachet/commit/27bca8280419966ba80c6fa283d985ddffa84bb6" } ], "source": { "advisory": "GHSA-79mg-4w23-4fqc", "discovery": "UNKNOWN" }, "title": "Unauthenticated SQL Injection", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-39165", "STATE": "PUBLIC", "TITLE": "Unauthenticated SQL Injection" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cachet", "version": { "version_data": [ { "version_value": "\u003c= 2.3.18" } ] } } ] }, "vendor_name": "fiveai" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cachet is an open source status page. With Cachet prior to and including 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator\u0027s password and session. The original repository of Cachet \u003chttps://github.com/CachetHQ/Cachet\u003e is not active, the stable version 2.3.18 and it\u0027s developing 2.4 branch is affected." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287: Improper Authentication" } ] }, { "description": [ { "lang": "eng", "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/fiveai/Cachet/security/advisories/GHSA-79mg-4w23-4fqc", "refsource": "CONFIRM", "url": "https://github.com/fiveai/Cachet/security/advisories/GHSA-79mg-4w23-4fqc" }, { "name": "https://github.com/fiveai/Cachet/commit/27bca8280419966ba80c6fa283d985ddffa84bb6", "refsource": "MISC", "url": "https://github.com/fiveai/Cachet/commit/27bca8280419966ba80c6fa283d985ddffa84bb6" } ] }, "source": { "advisory": "GHSA-79mg-4w23-4fqc", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-39165", "datePublished": "2021-08-26T20:25:12", "dateReserved": "2021-08-16T00:00:00", "dateUpdated": "2024-08-04T01:58:18.142Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-39174 (GCVE-0-2021-39174)
Vulnerability from cvelistv5
Published
2021-08-27 23:25
Modified
2024-08-04 01:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-75 - Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)
Summary
Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can leak the value of any configuration entry of the dotenv file, e.g. the application secret (`APP_KEY`) and various passwords (email, database, etc). This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of nested variables in the resulting dotenv configuration file. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:58:18.255Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/fiveai/Cachet/releases/tag/v2.5.1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/fiveai/Cachet/security/advisories/GHSA-88f9-7xxh-c688" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cachet", "vendor": "fiveai", "versions": [ { "status": "affected", "version": "\u003c 2.5.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can leak the value of any configuration entry of the dotenv file, e.g. the application secret (`APP_KEY`) and various passwords (email, database, etc). This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of nested variables in the resulting dotenv configuration file. As a workaround, only allow trusted source IP addresses to access to the administration dashboard." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-75", "description": "CWE-75: Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-02T15:13:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/fiveai/Cachet/releases/tag/v2.5.1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/fiveai/Cachet/security/advisories/GHSA-88f9-7xxh-c688" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/" } ], "source": { "advisory": "GHSA-88f9-7xxh-c688", "discovery": "UNKNOWN" }, "title": "Configuration leak", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-39174", "STATE": "PUBLIC", "TITLE": "Configuration leak" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cachet", "version": { "version_data": [ { "version_value": "\u003c 2.5.1" } ] } } ] }, "vendor_name": "fiveai" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can leak the value of any configuration entry of the dotenv file, e.g. the application secret (`APP_KEY`) and various passwords (email, database, etc). This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of nested variables in the resulting dotenv configuration file. As a workaround, only allow trusted source IP addresses to access to the administration dashboard." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-75: Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/fiveai/Cachet/releases/tag/v2.5.1", "refsource": "MISC", "url": "https://github.com/fiveai/Cachet/releases/tag/v2.5.1" }, { "name": "https://github.com/fiveai/Cachet/security/advisories/GHSA-88f9-7xxh-c688", "refsource": "CONFIRM", "url": "https://github.com/fiveai/Cachet/security/advisories/GHSA-88f9-7xxh-c688" }, { "name": "https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/", "refsource": "MISC", "url": "https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/" } ] }, "source": { "advisory": "GHSA-88f9-7xxh-c688", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-39174", "datePublished": "2021-08-27T23:25:08", "dateReserved": "2021-08-16T00:00:00", "dateUpdated": "2024-08-04T01:58:18.255Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-39172 (GCVE-0-2021-39172)
Vulnerability from cvelistv5
Published
2021-08-27 22:50
Modified
2024-08-04 01:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-93 - Improper Neutralization of CRLF Sequences ('CRLF Injection')
Summary
Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:58:18.282Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/fiveai/Cachet/security/advisories/GHSA-9jxw-cfrh-jxq6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/fiveai/Cachet/releases/tag/v2.5.1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cachet", "vendor": "fiveai", "versions": [ { "status": "affected", "version": "\u003c 2.5.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values. As a workaround, only allow trusted source IP addresses to access to the administration dashboard." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-93", "description": "CWE-93: Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-02T15:12:58", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/fiveai/Cachet/security/advisories/GHSA-9jxw-cfrh-jxq6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/fiveai/Cachet/releases/tag/v2.5.1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/" } ], "source": { "advisory": "GHSA-9jxw-cfrh-jxq6", "discovery": "UNKNOWN" }, "title": "New line injection during configuration edition", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-39172", "STATE": "PUBLIC", "TITLE": "New line injection during configuration edition" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cachet", "version": { "version_data": [ { "version_value": "\u003c 2.5.1" } ] } } ] }, "vendor_name": "fiveai" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cachet is an open source status page system. Prior to version 2.5.1, authenticated users, regardless of their privileges (User or Admin), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values. As a workaround, only allow trusted source IP addresses to access to the administration dashboard." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-93: Improper Neutralization of CRLF Sequences (\u0027CRLF Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/fiveai/Cachet/security/advisories/GHSA-9jxw-cfrh-jxq6", "refsource": "CONFIRM", "url": "https://github.com/fiveai/Cachet/security/advisories/GHSA-9jxw-cfrh-jxq6" }, { "name": "https://github.com/fiveai/Cachet/releases/tag/v2.5.1", "refsource": "MISC", "url": "https://github.com/fiveai/Cachet/releases/tag/v2.5.1" }, { "name": "https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/", "refsource": "MISC", "url": "https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/" } ] }, "source": { "advisory": "GHSA-9jxw-cfrh-jxq6", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-39172", "datePublished": "2021-08-27T22:50:09", "dateReserved": "2021-08-16T00:00:00", "dateUpdated": "2024-08-04T01:58:18.282Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-39173 (GCVE-0-2021-39173)
Vulnerability from cvelistv5
Published
2021-08-27 23:00
Modified
2024-08-04 01:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-704 - Incorrect Type Conversion or Cast
Summary
Cachet is an open source status page system. Prior to version 2.5.1 authenticated users, regardless of their privileges (User or Admin), can trick Cachet and install the instance again, leading to arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving the middleware `ReadyForUse`, which now performs a stricter validation of the instance name. As a workaround, only allow trusted source IP addresses to access to the administration dashboard.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:58:18.192Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/fiveai/Cachet/releases/tag/v2.5.1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/fiveai/Cachet/security/advisories/GHSA-r67m-m8c7-jp83" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cachet", "vendor": "fiveai", "versions": [ { "status": "affected", "version": "\u003c 2.5.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Cachet is an open source status page system. Prior to version 2.5.1 authenticated users, regardless of their privileges (User or Admin), can trick Cachet and install the instance again, leading to arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving the middleware `ReadyForUse`, which now performs a stricter validation of the instance name. As a workaround, only allow trusted source IP addresses to access to the administration dashboard." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-704", "description": "CWE-704: Incorrect Type Conversion or Cast", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-02T15:13:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/fiveai/Cachet/releases/tag/v2.5.1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/fiveai/Cachet/security/advisories/GHSA-r67m-m8c7-jp83" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/" } ], "source": { "advisory": "GHSA-r67m-m8c7-jp83", "discovery": "UNKNOWN" }, "title": "Forced reinstall", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-39173", "STATE": "PUBLIC", "TITLE": "Forced reinstall" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cachet", "version": { "version_data": [ { "version_value": "\u003c 2.5.1" } ] } } ] }, "vendor_name": "fiveai" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cachet is an open source status page system. Prior to version 2.5.1 authenticated users, regardless of their privileges (User or Admin), can trick Cachet and install the instance again, leading to arbitrary code execution on the server. This issue was addressed in version 2.5.1 by improving the middleware `ReadyForUse`, which now performs a stricter validation of the instance name. As a workaround, only allow trusted source IP addresses to access to the administration dashboard." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-704: Incorrect Type Conversion or Cast" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/fiveai/Cachet/releases/tag/v2.5.1", "refsource": "MISC", "url": "https://github.com/fiveai/Cachet/releases/tag/v2.5.1" }, { "name": "https://github.com/fiveai/Cachet/security/advisories/GHSA-r67m-m8c7-jp83", "refsource": "CONFIRM", "url": "https://github.com/fiveai/Cachet/security/advisories/GHSA-r67m-m8c7-jp83" }, { "name": "https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/", "refsource": "MISC", "url": "https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/" } ] }, "source": { "advisory": "GHSA-r67m-m8c7-jp83", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-39173", "datePublished": "2021-08-27T23:00:09", "dateReserved": "2021-08-16T00:00:00", "dateUpdated": "2024-08-04T01:58:18.192Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }