Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-32639— Server-Side Request Forgery (SSRF) in emissary:emissary

CVSS 7.2 · High EPSS 0.78% · P74
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-32639

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Server-Side Request Forgery (SSRF) in emissary:emissary
Source: NVD (National Vulnerability Database)
Vulnerability Description
Emissary is a P2P-based, data-driven workflow engine. Emissary version 6.4.0 is vulnerable to Server-Side Request Forgery (SSRF). In particular, the `RegisterPeerAction` endpoint and the `AddChildDirectoryAction` endpoint are vulnerable to SSRF. This vulnerability may lead to credential leaks. Emissary version 7.0 contains a patch. As a workaround, disable network access to Emissary from untrusted sources.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
服务端请求伪造(SSRF)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Emissary 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Emissary是一个应用软件。一个基于P2P的数据驱动的工作流引擎,可在异构的可能广泛分布的多层P2P网络计算资源中运行。 Emissary 6.4.0存在安全漏洞,该漏洞源于RegisterPeerAction 端点和 AddChildDirectoryAction 端点容易受到 SSRF 的攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
NationalSecurityAgencyemissary <= 6.4.0 -

II. Public POCs for CVE-2021-32639

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-32639

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2021-32639

No comments yet


Leave a comment