Vulnerability Details : CVE-2021-29133
Lack of verification in haserl, a component of Alpine Linux Configuration Framework, before 0.9.36 allows local users to read the contents of any file on the filesystem.
Products affected by CVE-2021-29133
- cpe:2.3:a:haserl_project:haserl:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-29133
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 35 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-29133
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST |
References for CVE-2021-29133
-
https://gitlab.alpinelinux.org/alpine/aports/-/issues/12539
Not FoundIssue Tracking;Vendor Advisory
-
https://github.com/rapid7/metasploit-framework/pull/14833
Add an haserl-based exploit for Alpine linux by jvoisin · Pull Request #14833 · rapid7/metasploit-framework · GitHubExploit;Patch;Third Party Advisory
-
https://github.com/rapid7/metasploit-framework/pull/14833/commits/5bf6b2d094deb22fa8183ce161b90cbe4fd40a70
Add an haserl-based exploit for Alpine linux by jvoisin · Pull Request #14833 · rapid7/metasploit-framework · GitHubPatch;Third Party Advisory
-
https://twitter.com/steaIth/status/1364940271054712842
TwitterThird Party Advisory
Jump to