CVE-2021-46703

In the IsolatedRazorEngine component of Antaris RazorEngine through 4.5.1-alpha001, an attacker can execute arbitrary .NET code in a sandboxed environment (if users can externally control template contents). NOTE: This vulnerability only affects products that are no longer supported by the maintainer
References
Link Resource
https://github.com/Antaris/RazorEngine/issues/585 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:razorengine_project:razorengine:*:*:*:*:*:*:*:*
cpe:2.3:a:razorengine_project:razorengine:4.5.1:alpha001:*:*:*:*:*:*

History

07 Nov 2023, 03:40

Type Values Removed Values Added
Summary ** UNSUPPORTED WHEN ASSIGNED ** In the IsolatedRazorEngine component of Antaris RazorEngine through 4.5.1-alpha001, an attacker can execute arbitrary .NET code in a sandboxed environment (if users can externally control template contents). NOTE: This vulnerability only affects products that are no longer supported by the maintainer. In the IsolatedRazorEngine component of Antaris RazorEngine through 4.5.1-alpha001, an attacker can execute arbitrary .NET code in a sandboxed environment (if users can externally control template contents). NOTE: This vulnerability only affects products that are no longer supported by the maintainer

Information

Published : 2022-03-06 06:15

Updated : 2024-08-04 06:15


NVD link : CVE-2021-46703

Mitre link : CVE-2021-46703

CVE.ORG link : CVE-2021-46703


JSON object : View

Products Affected

razorengine_project

  • razorengine