CVE-2021-27770
HCL Sametime is vulnerable to arbitrary HTTP requests
Severity Score
8.8
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The vulnerability was discovered within the “FaviconService”. The service takes a base64-encoded URL which is then requested by the webserver. We assume this service is used by the “meetings”-function where users can specify an external URL where the online meeting will take place.
Una vulnerabilidad fue detectada dentro de "FaviconService". El servicio toma una URL codificada en base64 que luego es solicitada por el servidor web. Suponemos que este servicio es usado por la función "meetings", en la que usuarios pueden especificar una URL externa en la que tendrá lugar la reunión en línea
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2021-02-26 CVE Reserved
- 2022-05-12 CVE Published
- 2023-12-03 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-472: External Control of Assumed-Immutable Web Parameter
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097430 | 2023-06-30 |