Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-34805

EPSS 89.94% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-34805

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in FAUST iServer before 9.0.019.019.7. For each URL request, it accesses the corresponding .fau file on the operating system without preventing %2e%2e%5c directory traversal.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Land Software Faust Iserver 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Land Software Faust Iserver是德国Land Software公司的用于将 Faust、Faust Entry 和 Lidos 数据库带到内联网和互联网上。 Land Software FAUST iServer 9.0.017.017.1- 9.0.018.018.4版本存在路径遍历漏洞,该漏洞源于软件缺少对于本地包含的限制,导致本地文件包含漏洞。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2021-34805

#POC DescriptionSource LinkShenlong Link
1FAUST iServer before 9.0.019.019.7 is susceptible to local file inclusion because for each URL request it accesses the corresponding .fau file on the operating system without preventing %2e%2e%5c directory traversal.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-34805.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-34805

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-01-31 · 27 CVEs total

CVE-2021-235215.5 MEDIUMLink Following
CVE-2021-235205.5 MEDIUMArbitrary File Write via Archive Extraction (Zip Slip)
CVE-2022-216595.3 MEDIUMObservable Response Discrepancy in Flask-AppBuilder
CVE-2021-46458Victor CMS SQL注入漏洞
CVE-2022-24130Xterm 安全漏洞
CVE-2022-23409Pixel&tonic Craft CMS 路径遍历漏洞
CVE-2021-27971Alpine 安全漏洞
CVE-2021-45079strongSwan 代码问题漏洞
CVE-2021-44255motionEyeOS和MotionEye-Project MotionEye 访问控制错误漏洞
CVE-2021-46101Git 安全漏洞
CVE-2020-36064Online Course Registration 信任管理问题漏洞
CVE-2020-36056Beetel 777VR1 跨站脚本漏洞
CVE-2021-28962Stormshield Network Security 命令注入漏洞
CVE-2021-31617Stormshield Network Security 缓冲区错误漏洞
CVE-2022-24266Elite Graphix Elite Cms SQL注入漏洞
CVE-2022-0286Linux kernel 代码问题漏洞
CVE-2021-40042Huawei 多款产品缓冲区错误漏洞
CVE-2021-40033HuaWei 多款产品信息泄露漏洞
CVE-2021-44114PHP 跨站脚本漏洞
CVE-2021-42631PrinterLogic Web Stack 代码问题漏洞

Showing top 20 of 27 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-34805

No comments yet


Leave a comment