// For flags

CVE-2021-32642

Missing input validation in dynamic discovery example scripts.

Severity Score

9.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

radsecproxy is a generic RADIUS proxy that supports both UDP and TLS (RadSec) RADIUS transports. Missing input validation in radsecproxy's `naptr-eduroam.sh` and `radsec-dynsrv.sh` scripts can lead to configuration injection via crafted radsec peer discovery DNS records. Users are subject to Information disclosure, Denial of Service, Redirection of Radius connection to a non-authenticated server leading to non-authenticated network access. Updated example scripts are available in the master branch and 1.9 release. Note that the scripts are not part of the installation package and are not updated automatically. If you are using the examples, you have to update them manually. The dyndisc scripts work independently of the radsecproxy code. The updated scripts can be used with any version of radsecproxy.

radsecproxy es un proxy RADIUS genérico que soporta transportes RADIUS UDP y TLS (RadSec). Una falta de comprobación de entrada en los scripts "naptr-eduroam.sh" y "radsec-dynsrv.sh" de radsecproxy puede conllevar a una inyección de configuración por medio de registros DNS de descubrimiento de peer radsec diseñados. Los usuarios están sujetos a una divulgación de información, una Denegación de Servicio, una Redirección de la conexión Radius a un servidor no autenticado que conlleva a un acceso a la red no autenticado. Los scripts de ejemplo actualizados están disponibles en la rama maestra y en la versión 1.9. Tome en cuenta que los scripts no forman parte del paquete de instalación y no son actualizados automáticamente. Si está usando los ejemplos, debe actualizarlos manualmente. Los scripts dyndisc funcionan independientemente del código radsecproxy. Los scripts actualizados pueden ser usados con cualquier versión de radsecproxy

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-05-12 CVE Reserved
  • 2021-05-28 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-10-15 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Uninett
Search vendor "Uninett"
Radsecproxy
Search vendor "Uninett" for product "Radsecproxy"
< 1.9.0
Search vendor "Uninett" for product "Radsecproxy" and version " < 1.9.0"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
33
Search vendor "Fedoraproject" for product "Fedora" and version "33"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
34
Search vendor "Fedoraproject" for product "Fedora" and version "34"
-
Affected