CVE-2021-43269

In Code42 app before 8.8.0, eval injection allows an attacker to change a device’s proxy configuration to use a malicious proxy auto-config (PAC) file, leading to arbitrary code execution. This affects Incydr Basic, Advanced, and Gov F1; CrashPlan Cloud; and CrashPlan for Small Business. (Incydr Professional and Enterprise are unaffected.)
Configurations

Configuration 1 (hide)

cpe:2.3:a:code42:code42:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:28

Type Values Removed Values Added
References () https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_security_advisories/Arbitrary_code_execution_via_malicious_Code42_app_proxy_configuration - Vendor Advisory () https://support.code42.com/Terms_and_conditions/Code42_customer_support_resources/Code42_security_advisories/Arbitrary_code_execution_via_malicious_Code42_app_proxy_configuration - Vendor Advisory
References () https://www.code42.com/r/support/CVE-2021-43269 - Vendor Advisory () https://www.code42.com/r/support/CVE-2021-43269 - Vendor Advisory

Information

Published : 2022-01-20 02:15

Updated : 2024-11-21 06:28


NVD link : CVE-2021-43269

Mitre link : CVE-2021-43269

CVE.ORG link : CVE-2021-43269


JSON object : View

Products Affected

code42

  • code42
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')