Camunda Modeler (aka camunda-modeler) through 4.6.0 allows arbitrary file access. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which manipulates the readFile and writeFile APIs. NOTE: the vendor states "The way we secured the app is that it does not allow any remote scripts to be opened, no unsafe scripts to be evaluated, no remote sites to be browsed.
References
Link | Resource |
---|---|
https://github.com/camunda/camunda-modeler/issues/2143 | Exploit Issue Tracking Third Party Advisory |
https://github.com/camunda/camunda-modeler/issues/2143 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 05:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/camunda/camunda-modeler/issues/2143 - Exploit, Issue Tracking, Third Party Advisory |
07 Nov 2023, 03:32
Type | Values Removed | Values Added |
---|---|---|
Summary | Camunda Modeler (aka camunda-modeler) through 4.6.0 allows arbitrary file access. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which manipulates the readFile and writeFile APIs. NOTE: the vendor states "The way we secured the app is that it does not allow any remote scripts to be opened, no unsafe scripts to be evaluated, no remote sites to be browsed. |
Information
Published : 2021-03-11 22:15
Updated : 2024-11-21 05:59
NVD link : CVE-2021-28154
Mitre link : CVE-2021-28154
CVE.ORG link : CVE-2021-28154
JSON object : View
Products Affected
camunda
- modeler
CWE
CWE-862
Missing Authorization