CVE-2021-27908
 
Severity Score
4.4
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
In all versions prior to Mautic 3.3.2, secret parameters such as database credentials could be exposed publicly by an authorized admin user through leveraging Symfony parameter syntax in any of the free text fields in Mautic’s configuration that are used in publicly facing parts of the application.
En todas las versiones anteriores a Mautic 3.3.2, parámetros secretos, como las credenciales de la base de datos, podían ser expuestos públicamente por un usuario administrador autorizado aprovechando la sintaxis de los parámetros Symfony en cualquiera de los campos de texto libre en la configuración de Mautic que son usadas en las partes de la aplicación de cara al público
*Credits:
Discovered by Petr Gregor, Acquia, Fixed by Miroslav Fedeles, Acquia
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2021-03-02 CVE Reserved
- 2021-03-23 CVE Published
- 2024-07-25 EPSS Updated
- 2024-09-16 CVE Updated
- 2024-09-16 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/mautic/mautic/security/advisories/GHSA-4hjq-422q-4vpx | 2024-09-16 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|