Show plain JSON{"id": "CVE-2021-32642", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.4, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 5.5, "exploitabilityScore": 3.9}, {"type": "Secondary", "source": "security-advisories@github.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.0, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "integrityImpact": "LOW", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 4.7, "exploitabilityScore": 2.2}]}, "published": "2021-05-28T17:15:07.537", "references": [{"url": "https://github.com/radsecproxy/radsecproxy/security/advisories/GHSA-56gw-9rj9-55rc", "tags": ["Third Party Advisory"], "source": "security-advisories@github.com"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HOC5AFG65NYLMMUTNSBOPC5F4LBAC7BR/", "source": "security-advisories@github.com"}, {"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W7QK5M2SZVMCAFSRQMM6PRZZRQQ372XI/", "source": "security-advisories@github.com"}, {"url": "https://www.usenix.org/conference/usenixsecurity21/presentation/jeitner", "tags": ["Third Party Advisory"], "source": "security-advisories@github.com"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-74"}]}, {"type": "Secondary", "source": "security-advisories@github.com", "description": [{"lang": "en", "value": "CWE-20"}]}], "descriptions": [{"lang": "en", "value": "radsecproxy is a generic RADIUS proxy that supports both UDP and TLS (RadSec) RADIUS transports. Missing input validation in radsecproxy's `naptr-eduroam.sh` and `radsec-dynsrv.sh` scripts can lead to configuration injection via crafted radsec peer discovery DNS records. Users are subject to Information disclosure, Denial of Service, Redirection of Radius connection to a non-authenticated server leading to non-authenticated network access. Updated example scripts are available in the master branch and 1.9 release. Note that the scripts are not part of the installation package and are not updated automatically. If you are using the examples, you have to update them manually. The dyndisc scripts work independently of the radsecproxy code. The updated scripts can be used with any version of radsecproxy."}, {"lang": "es", "value": "radsecproxy es un proxy RADIUS gen\u00e9rico que soporta transportes RADIUS UDP y TLS (RadSec). Una falta de comprobaci\u00f3n de entrada en los scripts \"naptr-eduroam.sh\" y \"radsec-dynsrv.sh\" de radsecproxy puede conllevar a una inyecci\u00f3n de configuraci\u00f3n por medio de registros DNS de descubrimiento de peer radsec dise\u00f1ados. Los usuarios est\u00e1n sujetos a una divulgaci\u00f3n de informaci\u00f3n, una Denegaci\u00f3n de Servicio, una Redirecci\u00f3n de la conexi\u00f3n Radius a un servidor no autenticado que conlleva a un acceso a la red no autenticado. Los scripts de ejemplo actualizados est\u00e1n disponibles en la rama maestra y en la versi\u00f3n 1.9. Tome en cuenta que los scripts no forman parte del paquete de instalaci\u00f3n y no son actualizados autom\u00e1ticamente. Si est\u00e1 usando los ejemplos, debe actualizarlos manualmente. Los scripts dyndisc funcionan independientemente del c\u00f3digo radsecproxy. Los scripts actualizados pueden ser usados con cualquier versi\u00f3n de radsecproxy"}], "lastModified": "2023-11-07T03:35:20.547", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:uninett:radsecproxy:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E49B60A3-2309-4C26-9041-64641A66C648", "versionEndExcluding": "1.9.0"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194"}, {"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835"}], "operator": "OR"}]}], "sourceIdentifier": "security-advisories@github.com"}