Vulnerability Details : CVE-2021-41583
vpn-user-portal (aka eduVPN or Let's Connect!) before 2.3.14, as packaged for Debian 10, Debian 11, and Fedora, allows remote authenticated users to obtain OS filesystem access, because of the interaction of QR codes with an exec that uses the -r option. This can be leveraged to obtain additional VPN access.
Vulnerability category: Input validation
Products affected by CVE-2021-41583
- cpe:2.3:a:eduvpn:vpn-user-portal:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-41583
0.61%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 67 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-41583
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST | 2024-03-12 |
CWE ids for CVE-2021-41583
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-41583
-
https://list.surfnet.nl/pipermail/eduvpn-deploy/2021-September/000352.html
[eduVPN-deploy] Details Security Issue 2021-08-25Mailing List;Third Party Advisory
-
https://github.com/eduvpn/vpn-user-portal/releases
Releases · eduvpn/vpn-user-portal · GitHubRelease Notes;Third Party Advisory
Jump to