CVE-2021-32096

The ConsoleAction component of U.S. National Security Agency (NSA) Emissary 5.9.0 allows a CSRF attack that results in injecting arbitrary Ruby code (for an eval call) via the CONSOLE_COMMAND_STRING parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nsa:emissary:5.9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:06

Type Values Removed Values Added
References () https://blog.sonarsource.com/code-vulnerabilities-in-nsa-application-revealed - Exploit, Third Party Advisory () https://blog.sonarsource.com/code-vulnerabilities-in-nsa-application-revealed - Exploit, Third Party Advisory
References () https://portswigger.net/daily-swig/nsa-workflow-application-emissary-vulnerable-to-malicious-takeover - Exploit, Third Party Advisory () https://portswigger.net/daily-swig/nsa-workflow-application-emissary-vulnerable-to-malicious-takeover - Exploit, Third Party Advisory

Information

Published : 2021-05-07 04:15

Updated : 2024-11-21 06:06


NVD link : CVE-2021-32096

Mitre link : CVE-2021-32096

CVE.ORG link : CVE-2021-32096


JSON object : View

Products Affected

nsa

  • emissary
CWE
CWE-352

Cross-Site Request Forgery (CSRF)