Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-21783

Опубликовано: 25 мар. 2021
Источник: debian

Описание

A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gsoapunfixedpackage

Примечания

  • Mis-assignment/report, see #987273. Should be rejected

  • https://talosintelligence.com/vulnerability_reports/TALOS-2021-1245

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 5 лет назад

A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.

CVSS3: 9.8
nvd
почти 5 лет назад

A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.

CVSS3: 9.8
github
больше 3 лет назад

A code execution vulnerability exists in the WS-Addressing plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to remote code execution. An attacker can send an HTTP request to trigger this vulnerability.

CVSS3: 9.8
fstec
около 5 лет назад

Уязвимость плагина WS-Addressing среды разработки программного обеспечения gSOAP, позволяющая нарушителю выполнить произвольный код