Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-3456

EPSS 0.02% · P7
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-3456

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An improper authorization handling flaw was found in Foreman. The Salt plugin for the smart-proxy allows foreman clients to execute actions that should be limited to the Foreman Server. This flaw allows an authenticated local attacker to access and delete limited resources and also causes a denial of service on the Foreman server. The highest threat from this vulnerability is to integrity and system availability.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
授权机制不正确
Source: NVD (National Vulnerability Database)
Vulnerability Title
Foreman 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Foreman是一套用于物理和虚拟服务器中的生命周期管理工具。该工具提供服务开通、配置管理以及报告状态等功能。 Foreman 存在安全漏洞,该漏洞源于授权处理不当,攻击者可利用该漏洞访问和删除有限的资源,还会导致Foreman服务器拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-smart_proxy_salt affecting up to, including smart_proxy_salt 2.1.5 -

II. Public POCs for CVE-2021-3456

#POC DescriptionSource LinkShenlong Link
1A practical chain that starts with an innocuous PDF file and ends up in a reverse shell on an AWS EC2 instancehttps://github.com/mrk336/CVE-2021-3456POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-3456

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-03-30 · 99 CVEs total

CVE-2022-282239.1 CRITICALTekon KIO 代码问题漏洞
CVE-2021-39755Google Android 安全漏洞
CVE-2021-39770Google Android 安全漏洞
CVE-2021-39769Google Android 安全漏洞
CVE-2021-39764Google Android 安全漏洞
CVE-2021-39767Google Android 安全漏洞
CVE-2021-39766Google Android 安全漏洞
CVE-2021-39765Google Android 安全漏洞
CVE-2021-39768Google Android 安全漏洞
CVE-2021-39757Google Android 安全漏洞
CVE-2021-39756Google Android 安全漏洞
CVE-2021-39758Google Android 安全漏洞
CVE-2021-39753Google Android 安全漏洞
CVE-2021-39752Google Android 安全漏洞
CVE-2021-39751Google Android 安全漏洞
CVE-2021-39750Google Android 安全漏洞
CVE-2021-39749Google Android 安全漏洞
CVE-2021-39748Google Android 安全漏洞
CVE-2021-39747Google Android 安全漏洞
CVE-2021-39746Google Android 安全漏洞

Showing top 20 of 99 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-3456

No comments yet


Leave a comment