In VembuBDR before 4.2.0.1 and VembuOffsiteDR before 4.2.0.1 installed on Windows, the http API located at /consumerweb/secure/download.php. Using this command argument an unauthenticated attacker can execute arbitrary OS commands with SYSTEM privileges.
References
Link | Resource |
---|---|
https://csirt.divd.nl/2021/05/11/Vembu-zero-days/ | Third Party Advisory |
https://csirt.divd.nl/cases/DIVD-2020-00011/ | Third Party Advisory |
https://csirt.divd.nl/cves/CVE-2021-26472/ | Third Party Advisory |
https://www.wbsec.nl/vembu | Broken Link Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2021-06-08 19:15
Updated : 2022-04-06 16:47
NVD link : CVE-2021-26472
Mitre link : CVE-2021-26472
CVE.ORG link : CVE-2021-26472
JSON object : View
Products Affected
vembu
- bdr_suite
- offsite_dr
microsoft
- windows
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')