Emissary is a P2P-based, data-driven workflow engine. Emissary version 6.4.0 is vulnerable to Server-Side Request Forgery (SSRF). In particular, the `RegisterPeerAction` endpoint and the `AddChildDirectoryAction` endpoint are vulnerable to SSRF. This vulnerability may lead to credential leaks. Emissary version 7.0 contains a patch. As a workaround, disable network access to Emissary from untrusted sources.
CVE Status: Modified
Attribute | Value |
---|---|
Attack Complexity | HIGH |
Attack Vector | NETWORK |
Availability Impact | LOW |
Base Score | 7.2 |
Base Severity | HIGH |
Confidentiality Impact | HIGH |
Integrity Impact | LOW |
Privileges Required | HIGH |
Scope | CHANGED |
User Interaction | NONE |
Vector String | CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L |
Exploitability Score | 1.3 |
Impact Score | 5.3 |
Source | [email protected] |
Type | Secondary |