Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:device42:device42:*:*:*:*:*:*:*:*", "matchCriteriaId": "B149253C-5FFF-4771-BD93-5CFBFFDB677D", "versionEndExcluding": "17.05.01", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "The Device42 Main Appliance before 17.05.01 does not sanitize user input in its Nmap Discovery utility. An attacker (with permissions to add or edit jobs run by this utility) can inject an extra argument to overwrite arbitrary files as the root user on the Remote Collector."}, {"lang": "es", "value": "Device42 Main Appliance versiones anteriores a 17.05.01, no sanea la entrada del usuario en su utilidad Nmap Discovery. Un atacante (con permisos para agregar o editar trabajos ejecutados por esta utilidad) puede inyectar un argumento extra para sobrescribir archivos arbitrarios como el usuario root en el Remote Collector"}], "id": "CVE-2021-41316", "lastModified": "2024-11-21T06:26:02.520", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-09-17T15:15:07.957", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://blog.device42.com/2021/09/critical-fixes-in-17-05-01/"}, {"source": "cve@mitre.org", "tags": ["Product", "Vendor Advisory"], "url": "https://docs.device42.com/auto-discovery/nmap-autodiscovery/"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://docs.device42.com/auto-discovery/remote-collector-rc/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://blog.device42.com/2021/09/critical-fixes-in-17-05-01/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Product", "Vendor Advisory"], "url": "https://docs.device42.com/auto-discovery/nmap-autodiscovery/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://docs.device42.com/auto-discovery/remote-collector-rc/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-88"}], "source": "nvd@nist.gov", "type": "Primary"}]}