CVE-2021-32639

Published at:
2021-07-02T16:15:08.967

Global infos:

Emissary is a P2P-based, data-driven workflow engine. Emissary version 6.4.0 is vulnerable to Server-Side Request Forgery (SSRF). In particular, the `RegisterPeerAction` endpoint and the `AddChildDirectoryAction` endpoint are vulnerable to SSRF. This vulnerability may lead to credential leaks. Emissary version 7.0 contains a patch. As a workaround, disable network access to Emissary from untrusted sources.

CVE Status: Modified

References:

  • [email protected]
  • [email protected]
  • [email protected]
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • af854a3a-2127-422b-91ae-364da2661108
  • Metrics:

    AttributeValue
    Attack ComplexityHIGH
    Attack VectorNETWORK
    Availability ImpactLOW
    Base Score7.2
    Base SeverityHIGH
    Confidentiality ImpactHIGH
    Integrity ImpactLOW
    Privileges RequiredHIGH
    ScopeCHANGED
    User InteractionNONE
    Vector StringCVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L
    Exploitability Score1.3
    Impact Score5.3
    Source[email protected]
    TypeSecondary

    Links:

    Exploit-db
    Github