CVE-2021-37334

Umbraco Forms version 4.0.0 up to and including 8.7.5 and below are vulnerable to a security flaw that could lead to a remote code execution attack and/or arbitrary file deletion. A vulnerability occurs because validation of the file extension is performed after the file has been stored in a temporary directory. By default, files are stored within the application directory structure at %BASEDIR%/APP_DATA/TEMP/FileUploads/. Whilst access to this directory is restricted by the root web.config file, it is possible to override this restriction by uploading another specially crafted web.config file to the temporary directory. It is possible to exploit this flaw to upload a malicious script file to execute arbitrary code and system commands on the server.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:umbraco:forms:*:*:*:*:*:*:*:*
cpe:2.3:a:umbraco:forms:*:*:*:*:*:*:*:*
cpe:2.3:a:umbraco:forms:*:*:*:*:*:*:*:*
cpe:2.3:a:umbraco:forms:*:*:*:*:*:*:*:*
cpe:2.3:a:umbraco:forms:*:*:*:*:*:*:*:*
cpe:2.3:a:umbraco:forms:*:*:*:*:*:*:*:*
cpe:2.3:a:umbraco:forms:*:*:*:*:*:*:*:*
cpe:2.3:a:umbraco:forms:*:*:*:*:*:*:*:*
cpe:2.3:a:umbraco:forms:*:*:*:*:*:*:*:*
cpe:2.3:a:umbraco:forms:*:*:*:*:*:*:*:*
cpe:2.3:a:umbraco:forms:*:*:*:*:*:*:*:*
cpe:2.3:a:umbraco:forms:*:*:*:*:*:*:*:*
cpe:2.3:a:umbraco:forms:*:*:*:*:*:*:*:*
cpe:2.3:a:umbraco:forms:*:*:*:*:*:*:*:*
cpe:2.3:a:umbraco:forms:*:*:*:*:*:*:*:*
cpe:2.3:a:umbraco:forms:*:*:*:*:*:*:*:*

History

28 Nov 2021, 23:10

Type Values Removed Values Added
CVSS v2 : 6.8
v3 : 9.8
v2 : 9.3
v3 : 9.8

22 Nov 2021, 21:15

Type Values Removed Values Added
Summary A security issue in Umbraco Forms 4.0.0 to and including 8.7.5 could lead to a remote code execution attack and/or arbitrary file deletion. Umbraco Forms version 4.0.0 up to and including 8.7.5 and below are vulnerable to a security flaw that could lead to a remote code execution attack and/or arbitrary file deletion. A vulnerability occurs because validation of the file extension is performed after the file has been stored in a temporary directory. By default, files are stored within the application directory structure at %BASEDIR%/APP_DATA/TEMP/FileUploads/. Whilst access to this directory is restricted by the root web.config file, it is possible to override this restriction by uploading another specially crafted web.config file to the temporary directory. It is possible to exploit this flaw to upload a malicious script file to execute arbitrary code and system commands on the server.

07 Sep 2021, 16:50

Type Values Removed Values Added
References (MISC) https://umbraco.com/blog/security-advisory-20th-of-july-2021-patch-is-now-available/ - (MISC) https://umbraco.com/blog/security-advisory-20th-of-july-2021-patch-is-now-available/ - Patch, Vendor Advisory
References (MISC) https://umbraco.com/blog/security-advisory-security-patches-for-umbraco-forms-ready-on-july-20th-2021-at-7-am-utc/ - (MISC) https://umbraco.com/blog/security-advisory-security-patches-for-umbraco-forms-ready-on-july-20th-2021-at-7-am-utc/ - Vendor Advisory
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:umbraco:forms:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 9.8

25 Aug 2021, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-08-25 22:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-37334

Mitre link : CVE-2021-37334

CVE.ORG link : CVE-2021-37334


JSON object : View

Products Affected

umbraco

  • forms