CVE-2021-32096

The ConsoleAction component of U.S. National Security Agency (NSA) Emissary 5.9.0 allows a CSRF attack that results in injecting arbitrary Ruby code (for an eval call) via the CONSOLE_COMMAND_STRING parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nsa:emissary:5.9.0:*:*:*:*:*:*:*

History

19 May 2021, 17:44

Type Values Removed Values Added
CPE cpe:2.3:a:nsa:emissary:5.9.0:*:*:*:*:*:*:*
CWE CWE-352
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 8.8
References (MISC) https://portswigger.net/daily-swig/nsa-workflow-application-emissary-vulnerable-to-malicious-takeover - (MISC) https://portswigger.net/daily-swig/nsa-workflow-application-emissary-vulnerable-to-malicious-takeover - Exploit, Third Party Advisory
References (MISC) https://blog.sonarsource.com/code-vulnerabilities-in-nsa-application-revealed - (MISC) https://blog.sonarsource.com/code-vulnerabilities-in-nsa-application-revealed - Exploit, Third Party Advisory

07 May 2021, 09:31

Type Values Removed Values Added

07 May 2021, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-05-07 04:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-32096

Mitre link : CVE-2021-32096

CVE.ORG link : CVE-2021-32096


JSON object : View

Products Affected

nsa

  • emissary
CWE
CWE-352

Cross-Site Request Forgery (CSRF)