In VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1 installed on Windows, the http API located at /consumerweb/secure/download.php. Using this command argument an unauthenticated attacker can execute arbitrary OS commands with SYSTEM privileges.
References
Link | Resource |
---|---|
https://csirt.divd.nl/2021/05/11/Vembu-zero-days/ | Third Party Advisory |
https://csirt.divd.nl/cves/CVE-2021-26472/ | Third Party Advisory |
https://csirt.divd.nl/cases/DIVD-2020-00011/ | Third Party Advisory |
https://www.wbsec.nl/vembu | Broken Link Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2021-06-08 12:15
Updated : 2022-04-06 09:47
NVD link : CVE-2021-26472
Mitre link : CVE-2021-26472
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
vembu
- bdr_suite
- offsite_dr
microsoft
- windows