Vulnerability Details : CVE-2021-28113
Potential exploit
A command injection vulnerability in the cookieDomain and relayDomain parameters of Okta Access Gateway before 2020.9.3 allows attackers (with admin access to the Okta Access Gateway UI) to execute OS commands as a privileged system account.
Products affected by CVE-2021-28113
- cpe:2.3:a:okta:access_gateway:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-28113
22.33%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-28113
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.7
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:P |
8.0
|
9.5
|
NIST | |
6.7
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L |
1.2
|
5.5
|
MITRE | |
6.7
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L |
1.2
|
5.5
|
NIST |
CWE ids for CVE-2021-28113
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-28113
-
http://packetstormsecurity.com/files/163428/Okta-Access-Gateway-2020.5.5-Authenticated-Remote-Root.html
Okta Access Gateway 2020.5.5 Authenticated Remote Root ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://www.okta.com/security-advisories/cve-2021-28113
Security Advisory: Okta Access Gateway CVE-2021-28113 | OktaVendor Advisory
Jump to