Vulnerability Details : CVE-2021-28122
A request-validation issue was discovered in Open5GS 2.1.3 through 2.2.x before 2.2.1. The WebUI component allows an unauthenticated user to use a crafted HTTP API request to create, read, update, or delete entries in the subscriber database. For example, new administrative users can be added. The issue occurs because Express is not set up to require authentication.
Products affected by CVE-2021-28122
- cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-28122
0.24%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 62 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-28122
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2021-28122
-
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-28122
-
https://github.com/open5gs/open5gs/compare/v2.2.0...v2.2.1
Comparing v2.2.0...v2.2.1 · open5gs/open5gs · GitHubPatch;Third Party Advisory
-
https://github.com/open5gs/open5gs/pull/838
Add API tokens by rashley-iqt · Pull Request #838 · open5gs/open5gs · GitHubPatch;Third Party Advisory
-
https://github.com/open5gs/open5gs/issues/837
Authentication Bypass in Webui · Issue #837 · open5gs/open5gs · GitHubExploit;Third Party Advisory
-
https://github.com/open5gs/open5gs/releases
Releases · open5gs/open5gs · GitHubRelease Notes;Third Party Advisory
Jump to