GlobalProtect-openconnect versions prior to 1.4.3 are affected by incorrect access control in GPService through DBUS, GUI Application. The way GlobalProtect-Openconnect is set up enables arbitrary users to execute commands as root by submitting the `--script=<script>` parameter.
References
Link | Resource |
---|---|
https://github.com/yuezk/GlobalProtect-openconnect/issues/113 | Exploit Issue Tracking Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-03-22 11:15
Updated : 2022-10-19 12:53
NVD link : CVE-2021-45809
Mitre link : CVE-2021-45809
CVE.ORG link : CVE-2021-45809
JSON object : View
Products Affected
globalprotect-openconnect_project
- globalprotect-openconnect
CWE