Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-41238

Опубликовано: 02 нояб. 2021
Источник: nvd
CVSS3: 8.6
CVSS3: 7.5
CVSS2: 5
EPSS Низкий

Описание

Hangfire is an open source system to perform background job processing in a .NET or .NET Core applications. No Windows Service or separate process required. Dashboard UI in Hangfire.Core uses authorization filters to protect it from showing sensitive data to unauthorized users. By default when no custom authorization filters specified, LocalRequestsOnlyAuthorizationFilter filter is being used to allow only local requests and prohibit all the remote requests to provide sensible, protected by default settings. However due to the recent changes, in version 1.7.25 no authorization filters are used by default, allowing remote requests to succeed. If you are using UseHangfireDashboard method with default DashboardOptions.Authorization property value, then your installation is impacted. If any other authorization filter is specified in the DashboardOptions.Authorization property, the you are not impacted. Patched versions (1.7.26) are available both on Nuget.org and as a tagged releas

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:hangfire:hangfire:1.7.25:*:*:*:*:*:*:*

EPSS

Процентиль: 51%
0.0028
Низкий

8.6 High

CVSS3

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-862
CWE-862

Связанные уязвимости

CVSS3: 8.6
github
больше 4 лет назад

Missing Authorization with Default Settings in Dashboard UI

EPSS

Процентиль: 51%
0.0028
Низкий

8.6 High

CVSS3

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-862
CWE-862