CVE-2021-36313

Dell EMC CloudLink 7.1 and all prior versions contain an OS command injection Vulnerability. A remote high privileged attacker, may potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker. This vulnerability is considered critical as it may be leveraged to completely compromise the vulnerable application as well as the underlying operating system. Dell recommends customers to upgrade at the earliest opportunity.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dell:cloudlink:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:13

Type Values Removed Values Added
References () https://www.dell.com/support/kbdoc/en-us/000193031/https-dellservices-lightning-force-com-one-one-appĀ - Vendor Advisory () https://www.dell.com/support/kbdoc/en-us/000193031/https-dellservices-lightning-force-com-one-one-appĀ - Vendor Advisory
CVSS v2 : 9.0
v3 : 7.2
v2 : 9.0
v3 : 9.1

Information

Published : 2021-11-23 20:15

Updated : 2024-11-21 06:13


NVD link : CVE-2021-36313

Mitre link : CVE-2021-36313

CVE.ORG link : CVE-2021-36313


JSON object : View

Products Affected

dell

  • cloudlink
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')