PatrOwl is a free and open-source solution for orchestrating Security Operations. In versions prior to 1.7.7 PatrowlManager unrestrictly handle upload files in the findings import feature. This vulnerability is capable of uploading dangerous type of file to server leading to XSS attacks and potentially other forms of code injection. Users are advised to update to 1.7.7 as soon as possible. There are no known workarounds for this issue.
References
Link | Resource |
---|---|
https://github.com/Patrowl/PatrowlManager/security/advisories/GHSA-5hc9-6hq4-2xfx | Third Party Advisory |
https://huntr.dev/bounties/17324785-f83a-4058-ac40-03f2bfa16399/ | Exploit Patch Third Party Advisory |
https://github.com/Patrowl/PatrowlManager/commit/2287c9715d2e7ef11b44bb0ad4a57727654f2203 | Patch Third Party Advisory |
Configurations
Information
Published : 2021-12-14 12:15
Updated : 2021-12-17 08:28
NVD link : CVE-2021-43829
Mitre link : CVE-2021-43829
JSON object : View
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
Products Affected
patrowl
- patrowlmanager