Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-33516

Опубликовано: 24 мая 2021
Источник: debian
EPSS Низкий

Описание

An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5. It allows DNS rebinding. A remote web server can exploit this vulnerability to trick a victim's browser into triggering actions against local UPnP services implemented using this library. Depending on the affected service, this could be used for data exfiltration, data tempering, etc.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gupnpfixed1.2.7-1experimentalpackage
gupnpfixed1.4.0-2package
gupnpno-dsabullseyepackage
gupnpno-dsabusterpackage
gupnpno-dsastretchpackage

Примечания

  • https://discourse.gnome.org/t/security-relevant-releases-for-gupnp-issue-cve-2021-33516/6536

  • https://gitlab.gnome.org/GNOME/gupnp/-/issues/24

  • https://gitlab.gnome.org/GNOME/gupnp/-/commit/05e964d48322ff23a65c6026d656e4494ace6ff9 (gupnp-1.0)

  • https://gitlab.gnome.org/GNOME/gupnp/-/commit/ca6ec9dcb26fd7a2a630eb6a68118659b589afac (master)

EPSS

Процентиль: 65%
0.00494
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 4 лет назад

An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5. It allows DNS rebinding. A remote web server can exploit this vulnerability to trick a victim's browser into triggering actions against local UPnP services implemented using this library. Depending on the affected service, this could be used for data exfiltration, data tempering, etc.

CVSS3: 8.3
redhat
около 4 лет назад

An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5. It allows DNS rebinding. A remote web server can exploit this vulnerability to trick a victim's browser into triggering actions against local UPnP services implemented using this library. Depending on the affected service, this could be used for data exfiltration, data tempering, etc.

CVSS3: 8.1
nvd
около 4 лет назад

An issue was discovered in GUPnP before 1.0.7 and 1.1.x and 1.2.x before 1.2.5. It allows DNS rebinding. A remote web server can exploit this vulnerability to trick a victim's browser into triggering actions against local UPnP services implemented using this library. Depending on the affected service, this could be used for data exfiltration, data tempering, etc.

suse-cvrf
почти 4 года назад

Security update for gupnp

suse-cvrf
почти 4 года назад

Security update for gupnp

EPSS

Процентиль: 65%
0.00494
Низкий