CVE-2021-29462

The Portable SDK for UPnP Devices is an SDK for development of UPnP device and control point applications. The server part of pupnp (libupnp) appears to be vulnerable to DNS rebinding attacks because it does not check the value of the `Host` header. This can be mitigated by using DNS revolvers which block DNS-rebinding attacks. The vulnerability is fixed in version 1.14.6 and later.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pupnp_project:pupnp:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:01

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 7.6
References () http://www.openwall.com/lists/oss-security/2021/04/20/4 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2021/04/20/4 - Mailing List, Third Party Advisory
References () https://github.com/pupnp/pupnp/security/advisories/GHSA-6hqq-w3jq-9fhg - Third Party Advisory () https://github.com/pupnp/pupnp/security/advisories/GHSA-6hqq-w3jq-9fhg - Third Party Advisory

Information

Published : 2021-04-20 21:15

Updated : 2024-11-21 06:01


NVD link : CVE-2021-29462

Mitre link : CVE-2021-29462

CVE.ORG link : CVE-2021-29462


JSON object : View

Products Affected

pupnp_project

  • pupnp
CWE
CWE-20

Improper Input Validation

CWE-345

Insufficient Verification of Data Authenticity