Vulnerability Details : CVE-2021-32773
Racket is a general-purpose programming language and an ecosystem for language-oriented programming. In versions prior to 8.2, code evaluated using the Racket sandbox could cause system modules to incorrectly use attacker-created modules instead of their intended dependencies. This could allow system functions to be controlled by the attacker, giving access to facilities intended to be restricted. This problem is fixed in Racket version 8.2. A workaround is available, depending on system settings. For systems that provide arbitrary Racket evaluation, external sandboxing such as containers limit the impact of the problem. For multi-user evaluation systems, such as the `handin-server` system, it is not possible to work around this problem and upgrading is required.
Products affected by CVE-2021-32773
- cpe:2.3:a:racket-lang:racket:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-32773
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 31 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-32773
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.9
|
3.6
|
NIST | |
6.1
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N |
1.6
|
4.0
|
GitHub, Inc. |
CWE ids for CVE-2021-32773
-
The product receives a request, message, or directive from an upstream component, but the product does not sufficiently preserve the original source of the request before forwarding the request to an external actor that is outside of the product's control sphere. This causes the product to appear to be the source of the request, leading it to act as a proxy or other intermediary between the upstream component and the external actor.Assigned by: security-advisories@github.com (Secondary)
-
The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-32773
-
https://github.com/racket/racket/commit/6ca4ffeca1e5877d44f835760ad89f18488d97e1
racket/sandbox: documentation and tests for reader and require checking · racket/racket@6ca4ffe · GitHubPatch;Third Party Advisory
-
https://github.com/racket/racket/security/advisories/GHSA-cgrw-p7p7-937c
Confused deputy attack in sandbox module resolution · Advisory · racket/racket · GitHubThird Party Advisory
Jump to