CVE-2021-36383

Xen Orchestra (with xo-web through 5.80.0 and xo-server through 5.84.0) mishandles authorization, as demonstrated by modified WebSocket resourceSet.getAll data is which the attacker changes the permission field from none to admin. The attacker gains access to data sets such as VMs, Backups, Audit, Users, and Groups.
References
Link Resource
https://github.com/vatesfr/xen-orchestra/issues/5712 Exploit Issue Tracking Third Party Advisory
https://github.com/vatesfr/xen-orchestra/issues/5712 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xen-orchestra:xo-server:*:*:*:*:*:*:*:*
cpe:2.3:a:xen-orchestra:xo-web:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:13

Type Values Removed Values Added
References () https://github.com/vatesfr/xen-orchestra/issues/5712 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/vatesfr/xen-orchestra/issues/5712 - Exploit, Issue Tracking, Third Party Advisory

Information

Published : 2021-07-12 14:15

Updated : 2024-11-21 06:13


NVD link : CVE-2021-36383

Mitre link : CVE-2021-36383

CVE.ORG link : CVE-2021-36383


JSON object : View

Products Affected

xen-orchestra

  • xo-server
  • xo-web